Role Based Authentication Schemes for Security Automation

Academy automation implies to the various different computing hardware and software that can be used to digitally create, manipulate, collect, store, and relay academy information needed for accomplishing basic operations like admissions and registration to finance, student and faculty interaction, online library, medical and business development. Raw data storage, electronic transfer, and the management of electronic business information comprise the basic activities of an Academy automation system. The main aim of this paper was to design and implement a Role Based Authentication (RBA) system wherein each user has certain roles allotted to him/her which defines the user's limits and capabilities of making changes, accessing various areas of the software and transferring/allotting these roles recursively.

Provided by: International Journal of Computer Theory and Engineering (IJCTE) Topic: Security Date Added: Feb 2011 Format: PDF

Find By Topic