Role-Based Access Controls



next up previous
Next: Introduction

Role-Based Access Controls

David Ferraiolo and Richard Kuhn
National Institute of Standards and Technology
Technology Administration
U.S. Department of Commerce
Gaithersburg, Md. 20899 USA
ABSTRACT

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC.

Keywords:
access control, computer security, discretionary access control, integrity, mandatory access control, role, TCSEC





next up previous
Next: Introduction



John Barkley
Mon Jan 9 13:56:57 EST 1995