From literature study, we collected: (a) a set of core features of the RBAC model, according to the ANSI/INCITS 359:2004 RBAC standard, (b) implicit assumptions, (c) a set of strengths, and (d) a set of phenomena which may limit these strengths in practice. To acquire insights about these four elements and complement our initial set of strengths and phenomena, a survey was designed and launched online between June and July 2011. This report consolidates results obtained from the survey.
|Place of Publication||Enschede|
|Publisher||Centre for Telematics and Information Technology (CTIT)|
|Number of pages||47|
|Publication status||Published - Feb 2012|
|Name||CTIT Technical Report Series|
|Publisher||Centre for Telematics and Information Technology University of Twente|
- IS-Design science methodology
- RBAC (Role-Based Access Control)
- IAM (Identity and Access Management)
- Empirical Research
Condori-Fernandez, N., Nunes Leal Franqueira, V., & Wieringa, R. J. (2012). Report on the Survey of Role-Based Access Control (RBAC) in Practice. (CTIT Technical Report Series; No. TR-CTIT-12-06). Enschede: Centre for Telematics and Information Technology (CTIT).