ANSI INCITS 359 : 2012
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL
Hardcopy , PDF
19-04-2024
English
01-01-2012
FOREWORD
1 SCOPE
2 CONFORMANCE
3 NORMATIVE REFERENCES
4 TERMS AND DEFINITIONS
5 RBAC REFERENCE MODEL
6 POLICY ENHANCEMENTS
7 RBAC SYSTEM AND ADMINISTRATIVE FUNCTIONAL SPECIFICATION
A FUNCTIONAL SPECIFICATION OVERVIEW
B RATIONALE - INFORMATIVE ANNEX
C COMMAND LIST
Consists of two main parts - the RBAC Reference Model and the RBAC System and Administrative Functional Specification. The RBAC Reference Model defines sets of basic RBAC elements (i.e., users, roles, permissions, operations and objects) and relations as types and functions that are included in this standard. The RBAC System and Administrative Functional Specification specify the features that are required of an RBAC system.
DocumentType |
Standard
|
Pages |
61
|
PublisherName |
Information Technology Industry Council
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
DIN EN ISO 22600-3:2015-02 | HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS (ISO 22600-3:2014) |
UNI EN ISO 22600-3 : 2014 | HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS |
12/30271007 DC : 0 | BS ISO 22600-3 - HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS |
17/30349181 DC : 0 | BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
10/30143797 DC : 0 | BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
BS ISO/IEC 24760-1:2011 | Information technology. Security techniques. A framework for identity management Terminology and concepts |
ASTM E 2595 : 2007 : R2013 | Standard Guide for Privilege Management Infrastructure (Withdrawn 2017) |
TR 118 508 : 1.0.0 | ANALYSIS OF SECURITY SOLUTIONS FOR THE ONEM2M SYSTEM |
ISO/IEC 24760-1:2011 | Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
DD ISO/TS 22600-3:2009 | Health informatics. Privilege management and access control Implementations |
SR 002 564 : 2.0.0 | APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH |
ASTM E 2595 : 2007 | Standard Guide for Privilege Management Infrastructure |
TR 118 516 : 2.0.0 | ONEM2M; STUDY OF AUTHORIZATION ARCHITECTURE FOR SUPPORTING HETEROGENEOUS ACCESS CONTROL POLICIES (ONEM2M TR-0016 VERSION 2.0.0) |
EN ISO 22600-3:2014 | Health informatics - Privilege management and access control - Part 3: Implementations (ISO 22600-3:2014) |
DD IEC/TS 62351-8:2011 | Power systems management and associated information exchange. Data and communications security Role-based access control |
ANSI INCITS 459 : 2011 | INFORMATION TECHNOLOGY - REQUIREMENTS FOR THE IMPLEMENTATION AND INTEROPERABILITY OF ROLE BASED ACCESS CONTROL |
ANSI INCITS 494 : 2012 | INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL - POLICY-ENHANCED |
ISO/TS 22600-3:2009 | Health informatics Privilege management and access control Part 3: Implementations |
IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
IEC TR 62351-90-1:2018 | Power systems management and associated information exchange - Data and communications security - Part 90-1: Guidelines for handling role-based access control in power systems |
ISO 22600-3:2014 | Health informatics Privilege management and access control Part 3: Implementations |
ANSI INCITS 499 : 2018 | INFORMATION TECHNOLOGY - NEXT GENERATION ACCESS CONTROL - FUNCTIONAL ARCHITECTURE (NGAC-FA) |
BS EN ISO 22600-3:2014 | Health informatics. Privilege management and access control Implementations |
I.S. EN ISO 22600-3:2014 | HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS (ISO 22600-3:2014) |
IEEE C37.240-2014 | IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems |
ANSI INCITS 459 : 2011 | INFORMATION TECHNOLOGY - REQUIREMENTS FOR THE IMPLEMENTATION AND INTEROPERABILITY OF ROLE BASED ACCESS CONTROL |
ISO/IEC 13568:2002 | Information technology — Z formal specification notation — Syntax, type system and semantics |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.