, and vice versa. Richard Kuhn; Ramaswamy Chandramouli (2007). In an rbac-based system, an operation might be to 'create a credit account' transaction in a financial application or to 'populate a blood sugar level test' record in a medical application. (May 2012 in computer systems security, role-based access control rBAC ) 1 2 or role-based security 3 is an approach to restricting system access to authorized users. Feltus,., Petit,., Sloman,. Third ACM Workshop on Role Based Access Control. Barkley (1997) " Comparing simple role based access control models and access control lists In "Proceedings of the second ACM workshop on Role-based access control pages 127-132. Archived from the original (PDF) on 1 maint: Multiple names: authors list ( link ) Feltus. "Role Explosion: Acknowledging the Problem" (PDF). "Enhancement of Business IT Alignment by Including Responsibility Components in rbac" (PDF). Role Based Access Control on MLS Systems Without Kernel Changes (PDF). "erbac - Enterprise Role-Based Access Control (computing) - AcronymFinder". 7 DAC with groups (e.g., as implemented in posix file systems) can emulate rbac. The assignment of permission to perform a particular operation is meaningful, because the operations are granular with meaning within the application. A discussion of some of the design choices for the nist model has also been published. An underlying principle of SoD is that no individual should be able to effect a breach of security through dual privilege. "Configuring role-based access control to enforce mandatory and discretionary access control policies". Aligning Access Rights to Governance Needs with the Responsibility MetaModel (ReMMo) in the Frame of Enterprise Architecture (PDF). Barkley (1997) 18 showed that rbacm and ACLg are equivalent. 5th ACM Workshop Role-Based Access Control : 1 maint: Multiple names: authors list ( link ) Ferraiolo,.F., Kuhn,.R., and Sandhu,.