210 likes | 224 Views
This report explores the development of a prototype for role-based security systems using a template-based approach. It includes an introduction to role-based security, an evaluation of its importance and concepts, and a sample application.
E N D
Template Based Approach for Developing a Prototype of Role Based Security Systems Moinuddin Khaja Ghouse Masters Report, Final Defense Major Professor: Dr Bill Hankley Committee Members:Dr Scott Deloach, Dr Mitchell Neilsen Department of Computing and Information Sciences Kansas State University
Presentation Structure • Role Based Security – A Brief Introduction • The Approach • A Sample Application • Evaluation
Role Based Security • Importance • General Concepts • Discretionary Access Check (DAC) • Mandatory Access Check (MAC) • Role Based Access • Roles and Operations
Role Based Security • Characteristics • A Collection of job functions • Role Hierarchy • Role Authorization • Role Activation • Role Execution • Dynamic separation of duty • Operation Authorization
Approach Adopted: • Operations • Tasks • Roles • Users and Privileges • Target Applications
Approach: Design • Class Diagram • Use Case Diagram • Sequence Diagram
A Sample Application • Introduction • System Users (Business Titles) • Requester • Diagnostician • Billing Person • External Expert
Evaluation • Performance • Usability • Pros and Cons • Lessons Learnt