• ANSI INCITS 359 : 2012

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL

    Available format(s):  Hardcopy, PDF

    Superseded date:  19-04-2024

    Language(s):  English

    Published date:  01-01-2012

    Publisher:  Information Technology Industry Council

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    FOREWORD
    1 SCOPE
    2 CONFORMANCE
    3 NORMATIVE REFERENCES
    4 TERMS AND DEFINITIONS
    5 RBAC REFERENCE MODEL
    6 POLICY ENHANCEMENTS
    7 RBAC SYSTEM AND ADMINISTRATIVE FUNCTIONAL SPECIFICATION
    A FUNCTIONAL SPECIFICATION OVERVIEW
    B RATIONALE - INFORMATIVE ANNEX
    C COMMAND LIST

    Abstract - (Show below) - (Hide below)

    Consists of two main parts - the RBAC Reference Model and the RBAC System and Administrative Functional Specification. The RBAC Reference Model defines sets of basic RBAC elements (i.e., users, roles, permissions, operations and objects) and relations as types and functions that are included in this standard. The RBAC System and Administrative Functional Specification specify the features that are required of an RBAC system.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Information Technology Industry Council
    Status Superseded
    Superseded By
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    DIN EN ISO 22600-3:2015-02 HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS (ISO 22600-3:2014)
    UNI EN ISO 22600-3 : 2014 HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS
    12/30271007 DC : 0 BS ISO 22600-3 - HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS
    17/30349181 DC : 0 BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
    10/30143797 DC : 0 BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
    BS ISO/IEC 24760-1:2011 Information technology. Security techniques. A framework for identity management Terminology and concepts
    ASTM E 2595 : 2007 : R2013 Standard Guide for Privilege Management Infrastructure (Withdrawn 2017)
    TR 118 508 : 1.0.0 ANALYSIS OF SECURITY SOLUTIONS FOR THE ONEM2M SYSTEM
    ISO/IEC 24760-1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
    DD ISO/TS 22600-3:2009 Health informatics. Privilege management and access control Implementations
    SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
    DIN EN ISO 22600-3 E : 2015 HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS (ISO 22600-3:2014)
    ASTM E 2595 : 2007 Standard Guide for Privilege Management Infrastructure
    TR 118 516 : 2.0.0 ONEM2M; STUDY OF AUTHORIZATION ARCHITECTURE FOR SUPPORTING HETEROGENEOUS ACCESS CONTROL POLICIES (ONEM2M TR-0016 VERSION 2.0.0)
    EN ISO 22600-3:2014 Health informatics - Privilege management and access control - Part 3: Implementations (ISO 22600-3:2014)
    DD IEC/TS 62351-8:2011 Power systems management and associated information exchange. Data and communications security Role-based access control
    ANSI INCITS 459 : 2011 INFORMATION TECHNOLOGY - REQUIREMENTS FOR THE IMPLEMENTATION AND INTEROPERABILITY OF ROLE BASED ACCESS CONTROL
    ANSI INCITS 494 : 2012 INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL - POLICY-ENHANCED
    ISO/TS 22600-3:2009 Health informatics Privilege management and access control Part 3: Implementations
    IEC TS 62351-8:2011 Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control
    IEC TR 62351-90-1:2018 Power systems management and associated information exchange - Data and communications security - Part 90-1: Guidelines for handling role-based access control in power systems
    ISO 22600-3:2014 Health informatics Privilege management and access control Part 3: Implementations
    ANSI INCITS 499 : 2018 INFORMATION TECHNOLOGY - NEXT GENERATION ACCESS CONTROL - FUNCTIONAL ARCHITECTURE (NGAC-FA)
    BS EN ISO 22600-3:2014 Health informatics. Privilege management and access control Implementations
    I.S. EN ISO 22600-3:2014 HEALTH INFORMATICS - PRIVILEGE MANAGEMENT AND ACCESS CONTROL - PART 3: IMPLEMENTATIONS (ISO 22600-3:2014)
    IEEE C37.240-2014 IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems

    Standards Referencing This Book - (Show below) - (Hide below)

    ANSI INCITS 459 : 2011 INFORMATION TECHNOLOGY - REQUIREMENTS FOR THE IMPLEMENTATION AND INTEROPERABILITY OF ROLE BASED ACCESS CONTROL
    ISO/IEC 13568:2002 Information technology Z formal specification notation Syntax, type system and semantics
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective