翻訳と辞書
Words near each other
・ Role of the harp in Welsh history
・ Role of the international community in the Rwandan Genocide
・ Role of the media in the 1997 rebellion in Albania
・ Role of the United States in the Vietnam War
・ Role of women in Nicaraguan Revolution
・ Role of women in Pakistani media
・ Role of women in religion
・ Role Playa
・ Role reversal
・ Role set
・ Role suction
・ Role theory
・ Role, Lublin Voivodeship
・ Role, Pomeranian Voivodeship
・ Role, West Pomeranian Voivodeship
Role-based access control
・ Role-based assessment
・ Role-based collaboration
・ Role-oriented programming
・ Role-playing
・ Role-playing game
・ Role-playing game system
・ Role-playing game terms
・ Role-playing game theory
・ Role-playing video game
・ Role-taking theory
・ Rolea B'ier
・ Rolea B'ier District
・ Roledumab
・ Rolemaster


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Role-based access control : ウィキペディア英語版
Role-based access control

In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). RBAC is sometimes referred to as role-based security.
==Design==

Within an organization, roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles. Members or staff (or other system users) are assigned particular roles, and through those role assignments acquire the computer permissions to perform particular computer-system functions. Since users are not assigned permissions directly, but only acquire them through their role (or roles), management of individual user rights becomes a matter of simply assigning appropriate roles to the user's account; this simplifies common operations, such as adding a user, or changing a user's department.
Three primary rules are defined for RBAC:
# Role assignment: A subject can exercise a permission only if the subject has selected or been assigned a role.
# Role authorization: A subject's active role must be authorized for the subject. With rule 1 above, this rule ensures that users can take on only roles for which they are authorized.
# Permission authorization: A subject can exercise a permission only if the permission is authorized for the subject's active role. With rules 1 and 2, this rule ensures that users can exercise only permissions for which they are authorized.
Additional constraints may be applied as well, and roles can be combined in a hierarchy where higher-level roles subsume permissions owned by sub-roles.
With the concepts of role hierarchy and constraints, one can control RBAC to create or simulate lattice-based access control (LBAC). Thus RBAC can be considered to be a superset of LBAC.
When defining an RBAC model, the following conventions are useful:
* S = Subject = A person or automated agent
* R = Role = Job function or title which defines an authority level
* P = Permissions = An approval of a mode of access to a resource
* SE = Session = A mapping involving S, R and/or P
* SA = Subject Assignment
* PA = Permission Assignment
* RH = Partially ordered Role Hierarchy. RH can also be written: ≥ (The notation: x ≥ y means that x inherits the permissions of y.)
*
* A subject can have multiple roles.
*
* A role can have multiple subjects.
*
* A role can have many permissions.
*
* A permission can be assigned to many roles.
*
* An operation can be assigned many permissions.
*
* A permission can be assigned to many operations.
A constraint places a restrictive rule on the potential inheritance of permissions from opposing roles, thus it can be used to achieve appropriate separation of duties. For example, the same person should not be allowed to both create a login account and to authorize the account creation.
Thus, using set theory notation:
* PA \subseteq P \times R and is a many to many permission to role assignment relation.
* SA \subseteq S \times R and is a many to many subject to role assignment relation.
* RH \subseteq R \times R
A subject may have ''multiple'' simultaneous sessions with different permissions.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Role-based access control」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.