Sudo - RBAC

RBAC

In associated with SELinux, sudo can be used to transition between roles in role-based access control (RBAC).

Read more about this topic:  Sudo

Other articles related to "rbac":

Computer Security - Access Control Models - Role-based Access Control
... Role-based access control (RBAC) is an access policy determined by the system, not the owner ... RBAC is used in commercial applications and also in military systems, where multi-level security requirements may also exist ... RBAC differs from DAC in that DAC allows users to control access to their resources, while in RBAC, access is controlled at the system level, outside of the user's control ...
NIST RBAC Model - History
... In 2000, NIST called for a unified standard for RBAC, integrating the RBAC model published in 1992 by Ferraiolo and Kuhn with the RBAC framework introduced by Sandhu, Coyne, Feinstein, and ... Following debate and comment within the RBAC and security communities, NIST made revisions and proposed a U.S ... national standard for RBAC through the INCITS ...
Role-based Access Control - Relation To Other Models
... RBAC is a flexible access control technology whose flexibility allows it to implement DAC or MAC ... MAC can simulate RBAC if the role graph is restricted to a tree rather than a partially ordered set ... Prior to the development of RBAC, the Bell-LaPadula model (BLP) model was synonymous with MAC and file system permissions were synonymous with DAC ...
Role Hierarchy
... RBAC models generally treat the role hierarchy as either a tree (set theory), as in the 1992 RBAC model of Ferraiolo and Kuhn (FK), or a partially ordered set ... The NIST RBAC model, which unified the FK and SCFY models, treats the role hierarchy as a partial order, although RBAC products have not gone beyond the tree structured hierarchy ...