ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.9, No. 5)

Publication Date:

Authors : ; ;

Page : 201-213

Keywords : RBAC Models; Applications of RBAC; Extensions to RBAC; RoleCentric RBAC Models;

Source : Downloadexternal Find it from : Google Scholarexternal


Protecting the system resources from vulnerable access is more challenging in today's digitalized environment and identifying a suitable mechanism for access control is more critical. Access control based on Roles is more suitable for the organizational resources and this paper explores the role based access control (RBAC) models. RBAC models are based on the concept that the system resources are accessed based on the roles by which the user of the system access the system resources and every role in the system is associated with certain permissions. This paper identifies the requirements where the RBAC models needs to be extended to support the security of the systems. Such models are referred in this paper as RoleCentric extended models and the application of these extended models are explained in this paper along with the research opportunities.

Last modified: 2018-12-08 19:07:15