The Leading eBooks Store Online 4,272,009 members ⚫ 1,419,367 ebooks

New to

Learn more
Role-Based Access Control by David Ferraiolo
Buy this eBook
US$ 90.00
(If any tax is payable it will be calculated and shown at checkout.)
Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer RBAC in a networked environment and how to integrate it with existing infrastructure.

Because role hierarchies and role engineering are crucial to RBAC, you learn how to effectively implement them to ensure total access control. Specialized topics covered in detail include separation of duties, combining RBAC with military security models, and recent efforts toward standardization. This book also guides you through the various RBAC products available on the market and along the migration path to deploying RBAC for enterprise-wide security.


Introduction - Purpose and Fundamental of Access Control. Authorization Management and Access Control. Administration and Scalability Issues. Access Control Policies, Models, and Mechanisms. Brief History of Access Controls. Origins of Role-Based Access Controls (RBACs).

Access Control Methods - Access Control Matrix. Discretionary Access Control. Lattice Based Models. Mandatory Access Control. Domain Type Enforcements. Clark-Wilson. Chinese Wall.

Overview of RBAC - Roles v. Groups. Users, Roles, and Permissions. User/Role Assignments. Role/Permission Assignments. Role Hierarchies. Static Constraints. Session Management. Dynamic Constraints. Cost, Policy, and Administrative Benefits.

Role Hierarchies - Inheritance. Limited Hierarchies. General Hierarchies.

Separation of Duty Policies - Static Separation of Duty Policies. Dynamic Separation of Duty Policies. History-Based Separation of Duty Policies.

Using RBAC to Implement Military Policies - Implementing Multi-Level Security (MLS) Models with RBAC. Implementing Discretionary Access Control with RBAC. Implementing RBAC with MLS. Operation RBAC and MLS Policies Simultaneously.

Standard RBAC - Proposed NIST Standard. Common Criteria RBAC Protection Profile. Standards Conformance Issues.

RBAC Administration - Administrative Roles. Administrative Capabilities. Delegation.

Integrating RBAC with Existing Infrastructure - XML Schemas and Related Models for RBAC. RBAC Implementation in a PKI Environment.

Research Prototypes - RBAC/Web. Role Control Center.

Commercial RBAC Products - SUN Solaris. Sybase SQL Server. BMC INCONTROL for Security Management. Sysor Security Administration Manager. Tivoli TME Security Management. Computer Associates Protect IT. Siemens rbacDirX.

Migrating to RBAC - Determining Roles and Role Hierarchies from Existing Access Control Structures. Top Down and Bottom Up Approach. User/Role Ratios. Role Engineering Tools.

David Ferraiolo is a supervisory computer scientist in the Systems and Networks Security Group at the National Institute of Standards and Technology (NIST), Gaithersburg, MD. In addition to managing three access control and security management projects, he is leading research to improve operational assurance, security authentication, intrusion detection, and authorization.

D. Richard Kuhn is a computer scientist in the Computer Security Division of NIST. His primary technical interests are information security and software testing and assurance.

Ramaswamy Chandramouli is a computer scientist in the Computer Security Division of NIST. He has more than 17 years experience in design and development of IT solutions in industry and government, and coauthored the first international security protection profile for RBAC. His current work focuses on automated security testing tools, and he is coauthor of NIST’s proposed RBAC standard.

Artech House; March 2003
336 pages; ISBN 9781580533249
Read online, or download in secure PDF format
Title: Role-Based Access Control
Author: David Ferraiolo; Richard Kuhn; Ramaswamy Chandramouli