* In our Enterprise Applications section this week we had an interesting story looking at two of the major control mechanisms corporations use to manage users and resource access: roles and rules .In our Enterprise Applications section this week we had an interesting story looking at two of the major control mechanisms corporations use to manage users and resource access: roles and rules.Our author (jfontana@nww.com) says among other benefits, using roles and rules-based models can help tighten security around network resources and ensure compliance with federal regulations such as the Sarbanes-Oxley Act, Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act.Roles are predetermined sets of access privileges that are associated with a group of users on a network. Users are assigned to roles and inherit their access privileges. The National Institute of Standards and Technology (NIST) first developed the model, called Roles Based Access Control (RBAC), more than a decade ago. The Massachusetts Institute of Technology, Stanford University, Sun and PricewaterhouseCoopers are among those that have developed their own role-based models. In comparison, rules were introduced recently with the advent of provisioning systems, are more flexible, and act as “if/then” expressions that are executed within software at the time a user attempts to access a network resource. For example, a rule might state “if” the user has the title sales manager and works in Division A “then” he is entitled to access system B.Interest in roles and rules is accelerating, especially with the number of networked applications growing along with the internal and external users seeking access. Corporate users are seeking options and vendors are listening, including Beta Systems, Business Layers, IBM, Microsoft, Netegrity, Novell, OpenNetwork Technologies, RSA Security, Siemens and Waveset. There are many issues in implementing rules and roles across your enterprise. For more on this story see: https://www.nwfusion.com/news/2003/1006rulesroles.html Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions Industry news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe