ROLE-CENTRIC RBAC MODELS – A LITERATURE REVIEW
Journal: JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (JCET) (Vol.9, No. 5)Publication Date: 2018-12-28
Authors : SUGANTHY A; V PRASANNA VENKATESAN;
Page : 201-213
Keywords : RBAC Models; Applications of RBAC; Extensions to RBAC; RoleCentric RBAC Models.;
Abstract
Protecting the system resources from vulnerable access is more challenging in today's digitalized environment and identifying a suitable mechanism for access control is more critical. Access control based on Roles is more suitable for the organizational resources and this paper explores the role based access control (RBAC) models. RBAC models are based on the concept that the system resources are accessed based on the roles by which the user of the system access the system resources and every role in the system is associated with certain permissions. This paper identifies the requirements where the RBAC models needs to be extended to support the security of the systems. Such models are referred in this paper as RoleCentric extended models and the application of these extended models are explained in this paper along with the research opportunities.
Other Latest Articles
- MOBILE CACHE SHARING AND PREFETCHING FOR LATENCY REDUCTION USING SIGNALR
- Challenges involved in developing a personalized, tailor-made rehabilitation program for a child with congenital upper and lower limb deficiency
- PERFORMANCE EVOLUTION OF MACHINE LEARNING ALGORITHMS FOR NETWORK INTRUSION DETECTION SYSTEM
- TRACHEOBRONCHOPATHIA OSTEOCHONDROPLASTICA- A CASE REPORT
- DATA POOL: A STRUCTURE TO STORE VOLUMINOUS DATA
Last modified: 2018-12-11 15:45:27