From literature study, we collected: (a) a set of core features of the RBAC model, according to the ANSI/INCITS 359:2004 RBAC standard, (b) implicit assumptions, (c) a set of strengths, and (d) a set of phenomena which may limit
these strengths in practice. To acquire insights about these four elements and complement our initial set of strengths and phenomena, a survey was designed and launched online between June and July 2011. This report consolidates results obtained from the survey.
|Name||CTIT Technical Report Series|
|Publisher||Centre for Telematics and Information Technology University of Twente|
- IS-Design science methodology
- RBAC (Role-Based Access Control)
- IAM (Identity and Access Management)
- Empirical Research