In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). RBAC is sometimes referred to as role-based security.
Read more about Role-based Access Control: Design, Relation To Other Models, Use and Availability
Famous quotes containing the words access and/or control:
“Oh, the holiness of always being the injured party. The historically oppressed can find not only sanctity but safety in the state of victimization. When access to a better life has been denied often enough, and successfully enough, one can use the rejection as an excuse to cease all efforts. After all, one reckons, they dont want me, they accept their own mediocrity and refuse my best, they dont deserve me.”
—Maya Angelou (b. 1928)
“Above and beyond paying attention to feelings before and after a separation, never threaten your child with leaving or loss of love in an effort to control her behavior. Children believe their parents assertions that I will send you away, I wont love you any more, Ill go away, and are terrified with good reason. Fear is a very poor way of disciplining a child, and it can cause severe lifelong anxiety.”
—Alicia F. Lieberman (20th century)