• Shopping Cart
    There are no items in your cart

ANSI INCITS 359 : 2012

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL

Available format(s)

Hardcopy , PDF

Superseded date

19-04-2024

Superseded by

INCITS 359:2012(R2022)

Language(s)

English

Published date

01-01-2012

FOREWORD
1 SCOPE
2 CONFORMANCE
3 NORMATIVE REFERENCES
4 TERMS AND DEFINITIONS
5 RBAC REFERENCE MODEL
6 POLICY ENHANCEMENTS
7 RBAC SYSTEM AND ADMINISTRATIVE FUNCTIONAL SPECIFICATION
A FUNCTIONAL SPECIFICATION OVERVIEW
B RATIONALE - INFORMATIVE ANNEX
C COMMAND LIST

Consists of two main parts - the RBAC Reference Model and the RBAC System and Administrative Functional Specification. The RBAC Reference Model defines sets of basic RBAC elements (i.e., users, roles, permissions, operations and objects) and relations as types and functions that are included in this standard. The RBAC System and Administrative Functional Specification specify the features that are required of an RBAC system.

DocumentType
Standard
Pages
61
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy
Supersedes

DIN EN ISO 22600-3:2015-02 HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS (ISO 22600-3:2014)
UNI EN ISO 22600-3 : 2014 HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS
12/30271007 DC : 0 BS ISO 22600-3 - HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS
17/30349181 DC : 0 BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
10/30143797 DC : 0 BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
BS ISO/IEC 24760-1:2011 Information technology. Security techniques. A framework for identity management Terminology and concepts
ASTM E 2595 : 2007 : R2013 Standard Guide for Privilege Management Infrastructure (Withdrawn 2017)
TR 118 508 : 1.0.0 ANALYSIS OF SECURITY SOLUTIONS FOR THE ONEM2M SYSTEM
ISO/IEC 24760-1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
DD ISO/TS 22600-3:2009 Health informatics. Privilege management and access control Implementations
SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
ASTM E 2595 : 2007 Standard Guide for Privilege Management Infrastructure
TR 118 516 : 2.0.0 ONEM2M; STUDY OF AUTHORIZATION ARCHITECTURE FOR SUPPORTING HETEROGENEOUS ACCESS CONTROL POLICIES (ONEM2M TR-0016 VERSION 2.0.0)
EN ISO 22600-3:2014 Health informatics - Privilege management and access control - Part 3: Implementations (ISO 22600-3:2014)
DD IEC/TS 62351-8:2011 Power systems management and associated information exchange. Data and communications security Role-based access control
ANSI INCITS 459 : 2011 INFORMATION TECHNOLOGY - REQUIREMENTS FOR THE IMPLEMENTATION AND INTEROPERABILITY OF ROLE BASED ACCESS CONTROL
ANSI INCITS 494 : 2012 INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL - POLICY-ENHANCED
ISO/TS 22600-3:2009 Health informatics Privilege management and access control Part 3: Implementations
IEC TS 62351-8:2011 Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control
IEC TR 62351-90-1:2018 Power systems management and associated information exchange - Data and communications security - Part 90-1: Guidelines for handling role-based access control in power systems
ISO 22600-3:2014 Health informatics Privilege management and access control Part 3: Implementations
ANSI INCITS 499 : 2018 INFORMATION TECHNOLOGY - NEXT GENERATION ACCESS CONTROL - FUNCTIONAL ARCHITECTURE (NGAC-FA)
BS EN ISO 22600-3:2014 Health informatics. Privilege management and access control Implementations
I.S. EN ISO 22600-3:2014 HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS (ISO 22600-3:2014)
IEEE C37.240-2014 IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems

ANSI INCITS 459 : 2011 INFORMATION TECHNOLOGY - REQUIREMENTS FOR THE IMPLEMENTATION AND INTEROPERABILITY OF ROLE BASED ACCESS CONTROL
ISO/IEC 13568:2002 Information technology — Z formal specification notation — Syntax, type system and semantics

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.