In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). RBAC is sometimes referred to as role-based security.
Read more about Role-based Access Control: Design, Relation To Other Models, Use and Availability
Famous quotes containing the words access and/or control:
“The last publicized center of American writing was Manhattan. Its writers became known as the New York Intellectuals. With important connections to publishing, and universities, with access to the major book reviews, they were able to pose as the vanguard of American culture when they were so obsessed with the two JoesMcCarthy and Stalinthat they were to produce only two artists, Saul Bellow and Philip Roth, who left town.”
—Ishmael Reed (b. 1938)
“He took control of me for forty-five minutes. This time Ill have control over him for the rest of his life. If he gets out fifteen years from now, Ill know. Ill check on him every three months through police computers. If he makes one mistake hes going down again. Ill make sure. Im his worst enemy now.”
—Elizabeth Wilson, U.S. crime victim. As quoted in People magazine, p. 88 (May 31, 1993)