Published: June 01, 2010
Citation: Computer (IEEE Computer) vol. 43, no. 6, (June 2010) pp. 79-81
Author(s)
Richard Kuhn (NIST), Edward Coyne (SAIC), Timothy Weil (Raytheon Polar Services Company)
Announcement
Role based access control (RBAC) is a popular model for information security. It helps reduce the complexity of security administration and supports the review of permissions assigned to users, a feature critical to organizations that must determine their risk exposure from employee IT system access. RBAC is frequently criticized for the difficulty of setting up an initial role structure and for inflexibility in rapidly changing domains. A pure RBAC solution may have inadequate support for dynamic attributes such as time of day, which may need to be considered in determining user permissions. To support dynamic attributes, particularly in large organizations, a role explosion problem may result where thousands of separate roles are needed for different collections of permissions. Recent interest in attribute-based access control (ABAC) suggests that attributes and rules could either replace RBAC or make RBAC more simple and flexible.
Role based access control (RBAC) is a popular model for information security. It helps reduce the complexity of security administration and supports the review of permissions assigned to users, a feature critical to organizations that must determine their risk exposure from employee IT system...
See full abstract
Role based access control (RBAC) is a popular model for information security. It helps reduce the complexity of security administration and supports the review of permissions assigned to users, a feature critical to organizations that must determine their risk exposure from employee IT system access. RBAC is frequently criticized for the difficulty of setting up an initial role structure and for inflexibility in rapidly changing domains. A pure RBAC solution may have inadequate support for dynamic attributes such as time of day, which may need to be considered in determining user permissions. To support dynamic attributes, particularly in large organizations, a role explosion problem may result where thousands of separate roles are needed for different collections of permissions. Recent interest in attribute-based access control (ABAC) suggests that attributes and rules could either replace RBAC or make RBAC more simple and flexible.
Hide full abstract
Keywords
access control; computer security; role based access control
Control Families
None selected