In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). RBAC is sometimes referred to as role-based security.
Read more about Role-based Access Control: Design, Relation To Other Models, Use and Availability
Famous quotes containing the words access and/or control:
“Power, in Cases world, meant corporate power. The zaibatsus, the multinationals ..., had ... attained a kind of immortality. You couldnt kill a zaibatsu by assassinating a dozen key executives; there were others waiting to step up the ladder; assume the vacated position, access the vast banks of corporate memory.”
—William Gibson (b. 1948)
“We human beings do have some genuine freedom of choice and therefore some effective control over our own destinies. I am not a determinist. But I also believe that the decisive choice is seldom the latest choice in the series. More often than not, it will turn out to be some choice made relatively far back in the past.”
—A.J. (Arnold Joseph)