Access Control 47
Access Control 47 : Computer security: (5) Access control models: (5. 5) Role-based access Control RBAC: Three Primary Rules Are Defined for RBAC: (5) Public Policy: In?public policy, access control to restrict access to systems ("authorization") or to track or monitor behavior within systems ("accountability") is an implementation feature of using?trusted systems forsecurity or social control