Access Control 45


Access Control 45 : Computer security: (5) Access control models: (5. 5) Role-based access Control RBAC: Three Primary Rules Are Defined for RBAC: (3) Transaction Authorization: A subject can execute a transaction only if the transaction is authorized for the subject's active role. With rules 1 and 2, this rule ensures that users can execute only transactions for which they are authorized. Additional constraints may be applied as well, and roles can be combined in a hierarchy where higher-level roles subsume permissions owned by sub-roles. Most IT vendors offer RBAC in one or more products
No records Found
afaatim.com copyright © April 2016 Dr.K.R.Kamaal. All rights reserved