Jump to content

NIST RBAC model: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m External links: Categories reedited
add article on changes to model
Line 28: Line 28:
| doi = 10.1109/MSP.2007.173
| doi = 10.1109/MSP.2007.173
}}</ref>
}}</ref>
In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC).
<ref>{{cite journal
| author = Kuhn, D.R., Coyne, E.J., and Weil, T.R.
| title = Adding Attributes to Role Based Access Control
| journal = IEEE Computer
| volume = 43
| issue = 6
| year = 2010
| month = June
| pages = 79-81
| publisher = IEEE Press
| url = http://csrc.nist.gov/groups/SNS/rbac/documents/kuhn-coyne-weil-10.pdf
| format = [[PDF]]
}}</ref>


== See also ==
== See also ==

Revision as of 15:01, 22 February 2012

The NIST RBAC model is a standardized definition of role based access control. Although originally developed by the National Institute of Standards and Technology, the standard was adopted and is copyrighted and distributed as INCITS 359-2004 by the International Committee for Information Technology Standards (INCITS). It is managed by INCITS committee CS1.

History

In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and Youman (1996). This proposal was published by Sandhu, Ferraiolo, and Kuhn [1] and presented at the ACM 5th Workshop on Role Based Access Control. Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the INCITS. In 2004, the standard received ballot approval and was adopted as INCITS 359-2004. Sandhu, Ferraiolo, and Kuhn later published an explanation of the design choices in the model. [2] In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC). [3]

See also

References

  1. ^ Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (2000). "The NIST Model for Role Based Access Control: Toward a Unified Standard" (PDF). 5th ACM Workshop Role-Based Access Control. pp. 47–63. {{cite conference}}: Unknown parameter |booktitle= ignored (|book-title= suggested) (help); Unknown parameter |month= ignored (help)CS1 maint: multiple names: authors list (link)
  2. ^ Ferraiolo, D.F., Kuhn, D.R., and Sandhu, R. (2007). "RBAC Standard Rationale: comments on a Critique of the ANSI Standard on Role Based Access Control" (PDF). IEEE Security & Privacy. 5 (6). IEEE Press: 51–53. doi:10.1109/MSP.2007.173. {{cite journal}}: Unknown parameter |month= ignored (help)CS1 maint: multiple names: authors list (link)
  3. ^ Kuhn, D.R., Coyne, E.J., and Weil, T.R. (2010). "Adding Attributes to Role Based Access Control" (PDF). IEEE Computer. 43 (6). IEEE Press: 79–81. {{cite journal}}: Unknown parameter |month= ignored (help)CS1 maint: multiple names: authors list (link)
  • [1] (NIST RBAC web site)
  • [2] (INCITS web site)