NIST RBAC model: Difference between revisions
No edit summary |
|||
(11 intermediate revisions by 10 users not shown) | |||
Line 1: | Line 1: | ||
{{Proposed deletion/dated |
|||
⚫ | The '''NIST RBAC model''' is a standardized definition of [[role |
||
|concern = Redundant with primary [[Role-based access control|Role-Based Access Control]] article, which addresses NIST's role in RBAC development; not sufficiently notable enough to warrant a separate article. |
|||
|timestamp = 20241223010549 |
|||
|nom = 72.198.108.97 |
|||
⚫ | |||
⚫ | }}The '''NIST RBAC model''' is a standardized definition of [[role-based access control]]. Although originally developed by the [[National Institute of Standards and Technology]], the standard was adopted and is copyrighted and distributed as INCITS 359-2004 by the [[International Committee for Information Technology Standards]] (INCITS). |
||
The latest version is INCITS 359-2012.<ref>{{cite journal |
|||
| title = Information Technology - Role Based Access Control |
|||
| date = 2012-05-29 |
|||
⚫ | |||
| url = http://www.techstreet.com/products/1837530 |
|||
⚫ | |||
⚫ | |||
It is managed by INCITS committee CS1. |
|||
==History== |
==History== |
||
In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and Youman (1996). This proposal was published by Sandhu, Ferraiolo, and Kuhn |
In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and Youman (1996). This proposal was published by Sandhu, Ferraiolo, and Kuhn<ref>{{cite conference |
||
<ref>{{cite conference |
|||
| author = Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. |
| author = Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. |
||
| title = The NIST Model for Role Based Access Control: Toward a Unified Standard |
| title = The NIST Model for Role Based Access Control: Toward a Unified Standard |
||
| |
| book-title=5th ACM Workshop Role-Based Access Control |
||
|date=July 2000 |
|date=July 2000 |
||
| pages=47–63 |
| pages=47–63 |
||
| url = http://csrc.nist.gov/rbac/sandhu-ferraiolo-kuhn-00.pdf |
| url = http://csrc.nist.gov/rbac/sandhu-ferraiolo-kuhn-00.pdf |
||
| format = [[PDF]] |
|||
}}</ref> |
}}</ref> |
||
and presented at the ACM 5th Workshop on Role Based Access Control. Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the INCITS. In 2004, the standard received ballot approval and was adopted as INCITS 359-2004. Sandhu, Ferraiolo, and Kuhn later published an explanation of the design choices in the model. |
and presented at the ACM 5th Workshop on Role Based Access Control. Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the INCITS. In 2004, the standard received ballot approval and was adopted as INCITS 359-2004. Sandhu, Ferraiolo, and Kuhn later published an explanation of the design choices in the model.<ref>{{cite journal |
||
⚫ | |||
<ref>{{cite journal |
|||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
|volume = 5 |
|||
⚫ | |||
|issue = 6 |
|||
⚫ | |||
⚫ | |||
|pages = 51–53 |
|||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
⚫ | |||
|s2cid = 28140142 |
|||
⚫ | |||
|url-status = dead |
|||
⚫ | |||
|archive-url = https://web.archive.org/web/20080917093137/http://csrc.nist.gov/groups/SNS/rbac/documents/ferraiolo-kuhn-sandhu-07.pdf |
|||
}}</ref> |
|||
|archive-date = 2008-09-17 |
|||
⚫ | |||
In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC). |
In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC). |
||
<ref>{{cite journal |
<ref>{{cite journal |
||
Line 37: | Line 50: | ||
| publisher = IEEE Press |
| publisher = IEEE Press |
||
| url = http://csrc.nist.gov/groups/SNS/rbac/documents/kuhn-coyne-weil-10.pdf |
| url = http://csrc.nist.gov/groups/SNS/rbac/documents/kuhn-coyne-weil-10.pdf |
||
| doi=10.1109/mc.2010.155 |
|||
| format = [[PDF]] |
|||
| s2cid = 17866775 |
|||
⚫ | |||
}}</ref> |
|||
== See also == |
== See also == |
||
Line 47: | Line 61: | ||
==External links== |
==External links== |
||
* [http://csrc.nist.gov/groups/SNS/rbac/index.html |
* [http://csrc.nist.gov/groups/SNS/rbac/index.html NIST RBAC web site] |
||
* [http://incits.org |
* [http://incits.org INCITS web site] |
||
[[Category:Computer access control]] |
[[Category:Computer access control]] |
||
[[Category:Computer network security]] |
|||
[[Category:Computer security models]] |
[[Category:Computer security models]] |
||
[[Category:Data security]] |
[[Category:Data security]] |
Latest revision as of 01:06, 23 December 2024
It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it. The article may be deleted if this message remains in place for seven days, i.e., after 01:05, 30 December 2024 (UTC). Find sources: "NIST RBAC model" – news · newspapers · books · scholar · JSTOR Nominator: Please consider notifying the author/project: {{subst:proposed deletion notify|NIST RBAC model|concern=Redundant with primary [[Role-based access control|Role-Based Access Control]] article, which addresses NIST's role in RBAC development; not sufficiently notable enough to warrant a separate article.}} ~~~~ |
The NIST RBAC model is a standardized definition of role-based access control. Although originally developed by the National Institute of Standards and Technology, the standard was adopted and is copyrighted and distributed as INCITS 359-2004 by the International Committee for Information Technology Standards (INCITS).
The latest version is INCITS 359-2012.[1] It is managed by INCITS committee CS1.
History
[edit]In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and Youman (1996). This proposal was published by Sandhu, Ferraiolo, and Kuhn[2] and presented at the ACM 5th Workshop on Role Based Access Control. Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the INCITS. In 2004, the standard received ballot approval and was adopted as INCITS 359-2004. Sandhu, Ferraiolo, and Kuhn later published an explanation of the design choices in the model.[3] In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC). [4]
See also
[edit]References
[edit]- ^ "Information Technology - Role Based Access Control" (PDF). 2012-05-29: 61.
{{cite journal}}
: Cite journal requires|journal=
(help) - ^ Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (July 2000). "The NIST Model for Role Based Access Control: Toward a Unified Standard" (PDF). 5th ACM Workshop Role-Based Access Control. pp. 47–63.
{{cite conference}}
: CS1 maint: multiple names: authors list (link) - ^ Ferraiolo, D.F., Kuhn, D.R., and Sandhu, R. (Nov–Dec 2007). "RBAC Standard Rationale: comments on a Critique of the ANSI Standard on Role Based Access Control" (PDF). IEEE Security & Privacy. 5 (6). IEEE Press: 51–53. doi:10.1109/MSP.2007.173. S2CID 28140142. Archived from the original (PDF) on 2008-09-17.
{{cite journal}}
: CS1 maint: multiple names: authors list (link) - ^ Kuhn, D.R., Coyne, E.J., and Weil, T.R. (June 2010). "Adding Attributes to Role Based Access Control" (PDF). IEEE Computer. 43 (6). IEEE Press: 79–81. doi:10.1109/mc.2010.155. S2CID 17866775.
{{cite journal}}
: CS1 maint: multiple names: authors list (link)