Jump to content

NIST RBAC model

From Wikipedia, the free encyclopedia

The NIST RBAC model is a standardized definition of role-based access control. Although originally developed by the National Institute of Standards and Technology, the standard was adopted and is copyrighted and distributed as INCITS 359-2004 by the International Committee for Information Technology Standards (INCITS). The latest version is INCITS 359-2012.[1] It is managed by INCITS committee CS1.

History

[edit]

In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and Youman (1996). This proposal was published by Sandhu, Ferraiolo, and Kuhn[2] and presented at the ACM 5th Workshop on Role Based Access Control. Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S. national standard for RBAC through the INCITS. In 2004, the standard received ballot approval and was adopted as INCITS 359-2004. Sandhu, Ferraiolo, and Kuhn later published an explanation of the design choices in the model.[3] In 2010, NIST announced a revision to RBAC, incorporating features of attribute-based access control (ABAC). [4]

See also

[edit]

References

[edit]
  1. ^ "Information Technology - Role Based Access Control" (PDF). 2012-05-29: 61. {{cite journal}}: Cite journal requires |journal= (help)
  2. ^ Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (July 2000). "The NIST Model for Role Based Access Control: Toward a Unified Standard" (PDF). 5th ACM Workshop Role-Based Access Control. pp. 47–63.{{cite conference}}: CS1 maint: multiple names: authors list (link)
  3. ^ Ferraiolo, D.F., Kuhn, D.R., and Sandhu, R. (Nov–Dec 2007). "RBAC Standard Rationale: comments on a Critique of the ANSI Standard on Role Based Access Control" (PDF). IEEE Security & Privacy. 5 (6). IEEE Press: 51–53. doi:10.1109/MSP.2007.173. S2CID 28140142. Archived from the original (PDF) on 2008-09-17.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  4. ^ Kuhn, D.R., Coyne, E.J., and Weil, T.R. (June 2010). "Adding Attributes to Role Based Access Control" (PDF). IEEE Computer. 43 (6). IEEE Press: 79–81. doi:10.1109/mc.2010.155. S2CID 17866775.{{cite journal}}: CS1 maint: multiple names: authors list (link)
[edit]