Access Control 44
Access Control 44 : Computer security: (5) Access control models: (5. 5) Role-based access Control RBAC: Three Primary Rules Are Defined for RBAC: (2) Role Authorization: A subject's active role must be authorized for the subject. With rule 1 above, this rule ensures that users can take on only roles for which they are authorized