Jump to content

NIST RBAC model: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Monkbot (talk | contribs)
No edit summary
 
(11 intermediate revisions by 10 users not shown)
Line 1: Line 1:
{{Proposed deletion/dated
The '''NIST RBAC model''' is a standardized definition of [[role based access control]]. Although originally developed by the [[National Institute of Standards and Technology]], the standard was adopted and is copyrighted and distributed as INCITS 359-2004 by the [[International Committee for Information Technology Standards]] (INCITS). It is managed by INCITS committee CS1.
|concern = Redundant with primary [[Role-based access control|Role-Based Access Control]] article, which addresses NIST's role in RBAC development; not sufficiently notable enough to warrant a separate article.
|timestamp = 20241223010549
|nom = 72.198.108.97
|help =
}}The '''NIST RBAC model''' is a standardized definition of [[role-based access control]]. Although originally developed by the [[National Institute of Standards and Technology]], the standard was adopted and is copyrighted and distributed as INCITS 359-2004 by the [[International Committee for Information Technology Standards]] (INCITS).
The latest version is INCITS 359-2012.<ref>{{cite journal
| title = Information Technology - Role Based Access Control
| date = 2012-05-29
| pages = 61
| url = http://www.techstreet.com/products/1837530
| format = [[PDF]]
}}</ref>
It is managed by INCITS committee CS1.


==History==
==History==
In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and Youman (1996). This proposal was published by Sandhu, Ferraiolo, and Kuhn
In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and Youman (1996). This proposal was published by Sandhu, Ferraiolo, and Kuhn<ref>{{cite conference
<ref>{{cite conference
| author = Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R.
| author = Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R.
| title = The NIST Model for Role Based Access Control: Toward a Unified Standard
| title = The NIST Model for Role Based Access Control: Toward a Unified Standard
| booktitle=5th ACM Workshop Role-Based Access Control
| book-title=5th ACM Workshop Role-Based Access Control
|date=July 2000
|date=July 2000
| pages=47–63
| pages=47–63
| url = http://csrc.nist.gov/rbac/sandhu-ferraiolo-kuhn-00.pdf
| url = http://csrc.nist.gov/rbac/sandhu-ferraiolo-kuhn-00.pdf
| format = [[PDF]]
}}</ref>
}}</ref>
and presented at the ACM 5th Workshop on Role Based Access Control. Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the INCITS. In 2004, the standard received ballot approval and was adopted as INCITS 359-2004. Sandhu, Ferraiolo, and Kuhn later published an explanation of the design choices in the model.
and presented at the ACM 5th Workshop on Role Based Access Control. Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the INCITS. In 2004, the standard received ballot approval and was adopted as INCITS 359-2004. Sandhu, Ferraiolo, and Kuhn later published an explanation of the design choices in the model.<ref>{{cite journal
|author = Ferraiolo, D.F., Kuhn, D.R., and Sandhu, R.
<ref>{{cite journal
|title = RBAC Standard Rationale: comments on a Critique of the ANSI Standard on Role Based Access Control
| author = Ferraiolo, D.F., Kuhn, D.R., and Sandhu, R.
|journal = IEEE Security & Privacy
| title = RBAC Standard Rationale: comments on a Critique of the ANSI Standard on Role Based Access Control
|volume = 5
| journal = IEEE Security & Privacy
| volume = 5
|issue = 6
|date = Nov–Dec 2007
| issue = 6
|pages = 51–53
|date=Nov–Dec 2007
|publisher = IEEE Press
| pages = 51–53
|url = http://csrc.nist.gov/groups/SNS/rbac/documents/ferraiolo-kuhn-sandhu-07.pdf
| publisher = IEEE Press
|doi = 10.1109/MSP.2007.173
| url = http://csrc.nist.gov/groups/SNS/rbac/documents/ferraiolo-kuhn-sandhu-07.pdf
|s2cid = 28140142
| format = [[PDF]]
|url-status = dead
| doi = 10.1109/MSP.2007.173
|archive-url = https://web.archive.org/web/20080917093137/http://csrc.nist.gov/groups/SNS/rbac/documents/ferraiolo-kuhn-sandhu-07.pdf
}}</ref>
|archive-date = 2008-09-17
}}</ref>
In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC).
In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC).
<ref>{{cite journal
<ref>{{cite journal
Line 37: Line 50:
| publisher = IEEE Press
| publisher = IEEE Press
| url = http://csrc.nist.gov/groups/SNS/rbac/documents/kuhn-coyne-weil-10.pdf
| url = http://csrc.nist.gov/groups/SNS/rbac/documents/kuhn-coyne-weil-10.pdf
| doi=10.1109/mc.2010.155
| format = [[PDF]]
| s2cid = 17866775
}}</ref>
}}</ref>


== See also ==
== See also ==
Line 47: Line 61:


==External links==
==External links==
* [http://csrc.nist.gov/groups/SNS/rbac/index.html] (NIST RBAC web site)
* [http://csrc.nist.gov/groups/SNS/rbac/index.html NIST RBAC web site]
* [http://incits.org] (INCITS web site)
* [http://incits.org INCITS web site]


[[Category:Computer access control]]
[[Category:Computer access control]]
[[Category:Computer network security]]
[[Category:Computer security models]]
[[Category:Computer security models]]
[[Category:Data security]]
[[Category:Data security]]

Latest revision as of 01:06, 23 December 2024

The NIST RBAC model is a standardized definition of role-based access control. Although originally developed by the National Institute of Standards and Technology, the standard was adopted and is copyrighted and distributed as INCITS 359-2004 by the International Committee for Information Technology Standards (INCITS).

The latest version is INCITS 359-2012.[1] It is managed by INCITS committee CS1.

History

[edit]

In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and Youman (1996). This proposal was published by Sandhu, Ferraiolo, and Kuhn[2] and presented at the ACM 5th Workshop on Role Based Access Control. Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the INCITS. In 2004, the standard received ballot approval and was adopted as INCITS 359-2004. Sandhu, Ferraiolo, and Kuhn later published an explanation of the design choices in the model.[3] In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC). [4]

See also

[edit]

References

[edit]
  1. ^ "Information Technology - Role Based Access Control" (PDF). 2012-05-29: 61. {{cite journal}}: Cite journal requires |journal= (help)
  2. ^ Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (July 2000). "The NIST Model for Role Based Access Control: Toward a Unified Standard" (PDF). 5th ACM Workshop Role-Based Access Control. pp. 47–63.{{cite conference}}: CS1 maint: multiple names: authors list (link)
  3. ^ Ferraiolo, D.F., Kuhn, D.R., and Sandhu, R. (Nov–Dec 2007). "RBAC Standard Rationale: comments on a Critique of the ANSI Standard on Role Based Access Control" (PDF). IEEE Security & Privacy. 5 (6). IEEE Press: 51–53. doi:10.1109/MSP.2007.173. S2CID 28140142. Archived from the original (PDF) on 2008-09-17.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  4. ^ Kuhn, D.R., Coyne, E.J., and Weil, T.R. (June 2010). "Adding Attributes to Role Based Access Control" (PDF). IEEE Computer. 43 (6). IEEE Press: 79–81. doi:10.1109/mc.2010.155. S2CID 17866775.{{cite journal}}: CS1 maint: multiple names: authors list (link)
[edit]