A Study of Role based Access Control policies and Constraints
Miriyala Markandeyulu1, Bussa V.R.R.Nagarjuna2, Akula Ratna Babu3, A.S.K.Ratnam4
1Miriyala Markandeyulu, M.Tech(CSE) Vignan’s Lara Institute Of Technology & Science.Vadlamudi, Guntur, A.P., I ndia.
2Bussa V.R.R.Nagarjuna, M.Tech(CSE) Vignan’s Lara Institute Of Technology & Science.Vadlamudi, Guntur, A.P., I ndia.
3Akula Ratna Babu, M.Tech(CSE) Vignan’s Lara Institute Of Technology & Science.Vadlamudi, Guntur, A.P., I ndia.
4A.S.K.Ratnam, Head, Dept.of Computer Science Engg,Vignan’s Lara Institute Of Engineering & Technology,Vadlamudi,Guntur, A.P.,India.
Manuscript received on February 15, 2012. | Revised Manuscript received on February 20, 2012. | Manuscript published on March 05, 2012. | PP: 279-282 | Volume-2 Issue-1, March 2012. | Retrieval Number: A0436022112/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Access control policies are constraints that protect computer-based information resources from unauthorized access. Role-Based Access Control (RBAC) is used by many organizations to protect their information resources from unauthorized access. RBAC policies are defined in terms of permissions that are associated with roles assigned to users. A permission determines what operations a user assigned to a role can perform on information resources. Role-based access control (RBAC) is also a powerful means for laying out higher-level organizational policies such as separation of duty, and for simplifying the security management process. One of the important aspects of RBAC is authorization constraints that express such organizational policies. This paper presents an overview of Role- based access control policies and constraints.
Keywords: Constraints, RBAC, Policies, UML.