Security

Role Based Authentication Schemes for Security Automation

Free registration required

Executive Summary

Academy automation implies to the various different computing hardware and software that can be used to digitally create, manipulate, collect, store, and relay academy information needed for accomplishing basic operations like admissions and registration to finance, student and faculty interaction, online library, medical and business development. Raw data storage, electronic transfer, and the management of electronic business information comprise the basic activities of an Academy automation system. The main aim of this paper was to design and implement a Role Based Authentication (RBA) system wherein each user has certain roles allotted to him/her which defines the user's limits and capabilities of making changes, accessing various areas of the software and transferring/allotting these roles recursively.

  • Format: PDF
  • Size: 310.9 KB