Abstract

ABSTRACT This article presents access control from a general and a role-based perspective. The article's focus is role based Access Control from a practical vice a theoretical perspective. The article starts with some access control definitions and two secure access control models. Access control is then presented in context of an abstract model, as preface to an in-depth assessment of Role Based Access Control (RBAC). Several examples contrast RBAC and the simple access control model. The article does not portray RBAC as a panacea, optimal for all situations. Indeed, it is feely admitted that RBAC may be counterproductive in some instances. But the point is also made that RBAC, when properly implemented in an appropriate environment, can reward the organization with economic, security and accountability benefits. Surrogacy is discussed as an essential RBAC attribute and, in practical terms, as a means of drastically reducing authorization volume. Lastly, the article touches on converting from simpler forms of access control to the more complex RBAC.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call