Enhanced Role Based Access Control: Integrating Auditing and Authentication

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
In past decade, lot of research has been done in RBAC (Role Based Access Control) technology. The industries have also shown great interest in RBAC. Most of the IT vendors are offering products that incorporate some form of RBAC. Today, all major DBMS products support RBAC. RBAC provides easier management of permissions in an organization and hence is most widely used model to control access of legitimate users. However research shows that access control is not a complete solution for securing a database.

Find By Topic