Also found in: Medical, Encyclopedia.
RBACRole-Based Access Control (informatics)
RBACRule-Based Access Control (informatics)
RBACRole Based Authorization Capabilities
RBACRole Based Access Control
RBACRose Bowl Aquatics Center (Pasadena, CA)
RBACRecycling Business Assistance Center (North Carolina Department of Environment and Natural Resources)
RBACRegulamento Brasileiro de Aviação Civil (Portuguese: Brazilian Rules of Civil Aviation; Brazil)
RBACRecreational Boating Advisory Council (Canada)
RBACRe-Use Business Assistance Center
References in periodicals archive ?
RBAC was used to analyze source and determine the user with permit policy in a software system.
The RBAC model is composed of the core, hierarchical, static separation of duty relations and the dynamic separation of duty relation components and was intended to cope with single-organization security policy strategy [5].
Reference [6] is another example that extends RBAC model with new concepts required for collaborative environments in both intra- and interorganizations.
[2.] Department of Energy, Office of Scientific and Technical Information, "RBAC Driven Least Privilege Architecture for Control Systems," http://www.osti.gov/scitech/servlets/purl/1124080, Accessed Sep.
Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC) are the common types of access control techniques in use.
= NULL do Update parameters by Algorithm 1, given [R.sup.new], [lambda], [eta], d, and [[THETA].sup.old] as the input parameters; if RBAC == true then Update parameters by Algorithm 1, given [R.sup.t], [lambda], [eta], d, itmax, and [[THETA].sup.old] as the input parameters; end if end while As the traditional matrix factorization only predicts the quality of service for a specific time-slot, as in the scenario of time-dependent QoS prediction, the quality of a web service i can be characterized by the mean of [r.sub.u,i,[tau]], where [r.sub.u,i,[tau]] is the set of predicted QoS value for the observed time-slots.
CP-ABE scheme works in the opposite manner, which is conceptually closer to the traditional access control methods, such as Role-Based Access Control (RBAC) [10].
Rocana has released Rocana Ops 1.6, introducing role-based access controls (RBAC) and support for new application performance metrics (StatsD) to enable deeper visibility with greater control across the enterprise, the company said.
Capacity In-Service Pipeline Project (Bcfd) Status Date San Elizario Crossing 1.10 Proposed Jan-17 Presidio Crossing 1.35 Proposed Mar-17 Impulsora 1.12 Proposed Jun-17 Road Runner 0.57 Proposed Apr-17 Sierrita Expansion 0.31 Proposed Oct-16 Sierrita 0.20 Existing Oct-14 NET Mexico 2.10 Existing Dec-14 KM Mexico-expansion 0.22 Existing Jun-14 Source: Navigant's North America Natural Gas Market Outlook, Spring 2016, RBAC, PointLogic.
Attribute based encryption Perfectly matches the model of Role-Based (ABE) Access Control (RBAC); effectively implements fine-grained access control.
We still have organizations struggling with role-based access controls (RBAC) and using systems that, at best, support group access rules.
The new version also adds role-based access control (RBAC) for the Heat orchestration and Neutron networking projects.