Information Security
Describe what roles are in Role Based Access Control (RBAC). Describe how Roles are related to Users and Permissions. Give an example of each one. provide support from ACM or IEEE references. Use APA format.