- About: Demo for the RBAC following NIST Model - Database Security Course Work
- School: HCM City University of Technology
- Lucturer : Dang Tran Khanh
- Access is determined by roles
- A user’s roles are assigned by security administrators
- A role’s permissions are assigned by security administrators
- RBAC0: contains the minimum functionality for an RBAC system
- RBAC1: includes the RBAC0 functionality and adds role hierarchies, which enable one role to inherit permissions from another role
- RBAC2: includes RBAC0 and adds constraints, which restrict the ways in which the components of a RBAC system may be configured
- RBAC3: contains the functionality of RBAC0, RBAC1, and RBAC2