A security[1] model[2] that restricts system access based on predefined roles and permissions assigned to individual users or user[3] groups.
Defined Terms
1. ↑ security.
The protection of information assets through the use of technology, processes, and training.