Abuse Melding

Je hebt een klacht over de onderstaande posting:

13-12-2004, 10:22 door Anoniem

Role based access control (also called role based security), as introduced in 1992 by Ferraiolo and Kuhn, has become the predominant model for advanced access control because it reduces the complexity and cost of security administration in large networked applications. bron: http://csrc.nist.gov/rbac/ AN INTRODUCTION TO ROLE-BASED ACCESS CONTROL http://csrc.nist.gov/rbac/NIST-ITL-RBAC-bulletin.html Overigens was er in de (DoD 5200.28-STD) Orangebook er al min of meer sprake van: 3.3.3.1.4 Trusted Facility Management The TCB shall support separate operator and administrator functions. The functions performed in the role of a security administrator shall be identified. The ADP system administrative personnel shall only be able to perform security administrator functions after taking a distinct auditable action to assume the security administrator role on the ADP system. Non- security functions that can be performed in the security administration role shall be limited ...

Beschrijf je klacht (Optioneel):

captcha