Rule Set Based Access Control
- Rule Set Based Access Control
-
Contrôle d'accès à base de règles
RSBAC (Rule Set Based Access Control) est un ensemble de sécurité pour Linux dont la fonction est d'offrir un contrôle supplémentaire d'accès aux ressources. Il peut utiliser plusieurs modèles de sécurité différents, tels ACL, MAC, RC, etc.
Il est utilisé par exemple dans le cas où il est utile de restreindre l'accès à certaines ressources au seul utilisateur root (qui a normalement accès à toutes les ressources).
Voir aussi
Liens externes
Contrôle d'accès en sécurité informatique |
- Types de contrôle d'accès
|
|
|
|
|
- Modèles de contrôle d'accès
|
|
|
|
|
- Portail de la sécurité informatique
Catégories : Logiciel de sécurité informatique | Sécurité du système d'exploitation | Contrôle d'accès informatique | Modèle de sécurité informatique
Wikimedia Foundation.
2010.
Contenu soumis à la licence CC-BY-SA. Source : Article Rule Set Based Access Control de Wikipédia en français (auteurs)
Regardez d'autres dictionnaires:
Role Based Access Control — (RBAC; deutsch: Rollenbasierte Zugriffskontrolle) ist in Mehrbenutzersystemen oder Rechnernetzen ein Verfahren zur Zugriffssteuerung und kontrolle auf Dateien oder Dienste. Das RBAC Modell wurde 1992 von D.F Ferraiolo und D.R. Kuhn beschrieben[1] … Deutsch Wikipedia
Organisation-based access control — In computer security, organization based access control (OrBAC) is an access control model first presented in 2003. The current approaches of the access control rest on the three entities (subject, action, object) to control the access the policy … Wikipedia
Role-based access control — In computer systems security, role based access control (RBAC) [cite conference author = Ferraiolo, D.F. and Kuhn, D.R. title = Role Based Access Control booktitle=15th National Computer Security Conference year = 1992 month = October pages=554… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… … Wikipedia
Mandatory Access Control — (MAC) („zwingend erforderliche Zugangskontrolle“) ist ein Oberbegriff für Konzepte zur Kontrolle und Steuerung von Zugriffsrechten, vor allem auf IT Systemen. Die Entscheidungen über Zugriffsberechtigungen werden nicht nur auf der Basis der… … Deutsch Wikipedia
Distributed Access Control System — DACS The Distributed Access Control System Original author(s) Developers at Distributed Systems Software Developer(s) Distributed Systems Software Stable release 1.4.26 / September 30, 2011; 14 days ago (2011 09 30) … Wikipedia
Timestamp-based concurrency control — In computer science, in the field of databases, timestamp based concurrency control is a non lock concurrency control method, used in relational databases to safely handle transactions, using timestamps.OperationAssumptions* Every timestamp value … Wikipedia
Control table — This simple control table directs program flow according to the value of the single input variable. Each table entry holds a possible input value to be tested for equality (implied) and a relevant subroutine to perform in the action column. The… … Wikipedia
Control flow — Not to be confused with Flow control. In computer science, control flow (or alternatively, flow of control) refers to the order in which the individual statements, instructions, or function calls of an imperative or a declarative program are… … Wikipedia