ROLE-CENTRIC RBAC MODELS – A LITERATURE REVIEW
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.9, No. 5)Publication Date: 2018-12-28
Authors : SUGANTHY A; V PRASANNA VENKATESAN;
Page : 201-213
Keywords : RBAC Models; Applications of RBAC; Extensions to RBAC; RoleCentric RBAC Models;
Abstract
Protecting the system resources from vulnerable access is more challenging in today's digitalized environment and identifying a suitable mechanism for access control is more critical. Access control based on Roles is more suitable for the organizational resources and this paper explores the role based access control (RBAC) models. RBAC models are based on the concept that the system resources are accessed based on the roles by which the user of the system access the system resources and every role in the system is associated with certain permissions. This paper identifies the requirements where the RBAC models needs to be extended to support the security of the systems. Such models are referred in this paper as RoleCentric extended models and the application of these extended models are explained in this paper along with the research opportunities.
Other Latest Articles
- MOBILE CACHE SHARING AND PREFETCHING FOR LATENCY REDUCTION USING SIGNALR
- PERFORMANCE EVOLUTION OF MACHINE LEARNING ALGORITHMS FOR NETWORK INTRUSION DETECTION SYSTEM
- DATA POOL: A STRUCTURE TO STORE VOLUMINOUS DATA
- Cuticular Biochemistry: Lambda-Cyhalothrin Induced Alterations in Mutant Drosophila melanogaster
- The Integration of Microbial Inoculation and Organic Fertilization to Improve the Productivity of Wheat (Triticum aestivum L.) in New Land
Last modified: 2018-12-08 19:07:15