Smart Quill Publishing

Jurnallar va konferensiyalar uchun akademik platforma

Oʻzbekcha

AXBOROT TIZIMLARI XAVFSIZLIGI MODELLARI: ROLLANIB BOSHQARILADIGAN KIRISH NAZORATI (RBAC) VA UNING SPETSIFIKATSIYALARI

Nashr sanasi
25.04.2026
Jurnal
Sun'iy intellektni pedagogik ta'limga tadbiq etishning ustivor yo'nalishlari
Nashr
Sun'iy intellektni pedagogik ta'limga tadbiq etishning ustivor yo'nalishlari
Sahifalar
16-17
DOI
10.5281/zenodo.19828057

Mualliflar

Annotatsiya

Ushbu maqolada axborot tizimlari xavfsizligini ta’minlashda rollarga asoslangan kirish nazorati (RBAC) modelining o‘rni, uning ishlash tamoyillari va o‘ziga xos spetsifikatsiyalari yoritiladi. Ma’lumotlar maxfiyligini saqlashda foydalanuvchi huquqlarini rollar orqali boshqarishning samaradorligi, tizim barqarorligiga ta’siri va zamonaviy axborot texnologiyalarida qo‘llanilishi tahlil qilinadi. Natijada, RBAC modelining boshqa kirish modellaridan afzalliklari va xavfsizlik siyosatini avtomatlashtirishdagi ahamiyati asoslab beriladi

Kalit so‘zlar

axborot xavfsizligi Axborot tizimlari xavfsizligi RBAC rollarga asoslangan kirish nazorati foydalanuvchi huquqlari ruxsatnomalar kiberxavfsizlik kirish nazorati eng kam imtiyoz tamoyili xavfsizlik siyosati

Boshqa tillardagi variantlar

English
This article highlights the role, operational principles, and specific specifications of Role-Based Access Control (RBAC) in ensuring information systems security. The effectiveness of managing user rights through roles in maintaining data confidentiality, its impact on system stability, and its application in modern information technologies are analyzed. As a result, the advantages of the RBAC model over other access models and its importance in automating security policies are substantiated.
information security Information systems security RBAC Role-Based Access Control user permissions authorization cybersecurity access control least privilege principle security policy

Foydalanilgan adabiyotlar

1. Gulyamov, S. S. Axborot xavfsizligi tizimlari. – Toshkent: Fan va texnologiya, 2022.
2. Sandhu, R., et al. "Role-Based Access Control Models". IEEE Computer, 2021.
3. O‘zbekiston Respublikasining "Kiberxavfsizlik to‘g‘risida"gi Qonuni, 2022.
PDFni ko'rish O‘xshash maqolalar