Blog
RBAC is Dead – Now What?
By Tripwire Guest Authors on Wed, 03/04/2015
Historically, access control has been based on the identity of a user requesting execution of a capability to perform an operation (e.g., read) on an object (e.g., a file). This was done directly either as in Discretionary Access Control or Mandatory Access Control or through predefined attribute types, such as roles or groups assigned to that user...