ROLE-CENTRIC RBAC MODELS – A LITERATURE REVIEWJournal: International Journal of Computer Engineering and Technology (IJCET) (Vol.9, No. 5)
Publication Date: 2018-12-28
Authors : SUGANTHY A; V PRASANNA VENKATESAN;
Page : 201-213
Keywords : RBAC Models; Applications of RBAC; Extensions to RBAC; RoleCentric RBAC Models;
Protecting the system resources from vulnerable access is more challenging in today's digitalized environment and identifying a suitable mechanism for access control is more critical. Access control based on Roles is more suitable for the organizational resources and this paper explores the role based access control (RBAC) models. RBAC models are based on the concept that the system resources are accessed based on the roles by which the user of the system access the system resources and every role in the system is associated with certain permissions. This paper identifies the requirements where the RBAC models needs to be extended to support the security of the systems. Such models are referred in this paper as RoleCentric extended models and the application of these extended models are explained in this paper along with the research opportunities.
Other Latest Articles
Last modified: 2018-12-08 19:07:15