Font Size: a A A

Design And Implementation Of Role Based Access Control In A Secure DBMS

Posted on:2005-05-17Degree:MasterType:Thesis
Country:ChinaCandidate:H YanFull Text:PDF
GTID:2168360152969177Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Currently more and more information is managed by database management systems. So database security is an important problem that must be solved. Access control mechanisms are the principal way to protect data. SDM3 is a secure databse management system. This project is concerned with the design and implementation issues of Role Based Access Control in SDM3.We must have a precise theoretical model as the guideline to implement Role Based Access Control.So we propse SDM3 RBAC model that is based upon RBAC96 model. It exactly defines two kinds of role constraints, role exclusion and cardinality. At the same time, it reconciles the conflicts between role hierarchy and role constraints.After Role Based Access Control is introduced in SDM3, the system will have three types of access controls, Discretionary Access Control, Mandatory Access Control and Role Based Access Control. We offer a solution to let the three types of access controls to coexist in SDM3 to guarantee the security of the system. In our solution, Discretionary Access Control and Role Based Access Control are the two sources of user privileges. Mandatory Access Control defines security label for subjects and objects in the system to control the information to flow one-dimensionally. And it is at the last stage of checking user privileges.We augment the SDM3 data dictionary to support role hierarchy, role static exclusion set and role dynamic exclusion set. So we can implement the features of role hierarchy, separation of duties and cardinal constraint efficiently. We build a local role hierarchy view for each user during the runtime to improve the speed of checking user privileges.
Keywords/Search Tags:Multilevel Secure Database Management System, Role Based Access Control, Role Hierarchy, Role Mutual Exclusion, Cardinal Constraint
PDF Full Text Request
Related items