OIC-CERT JOURNAL OF CYBER SECURITY
ISSN 2636-9680 | eISSN 2682-9266


 

 

Indexing:

 

Abstracted and indexed in:

 

 

 

Future:

 

 

Edition > Volume 2 > Issue 1 > The Development of Constraints in Role-based Access Control: A Systematic Review

 

The Development of Constraints in Role-based Access Control: A Systematic Review

 

Abstract:

Role-based access control (RBAC) model attracts many organizations to transform their traditional access control method to RBAC model mainly because of the security features in the RBAC. The RBAC model is generated to achieve security objectives and to do so, RBAC enforces various constraints to accomplish those objectives. Up to now, very limited studies provide systematic review of constraints in roles mining and in this study, we focus on the publications that published during 2011–2018. The main objective of this study is to recommend conceptual understanding through a systematic review by classifying the constraints and its proposed solutions. The analysis offered variety of areas that can be explored in leveraging constraints in the role mining development hence providing an improvement to roles-based access control growth.

 

 

Author(s) with Affiliation:

Nazirah Abd Hamid, Rabiah Ahmad & Siti Rahayu Selamat
Faculty of Information & Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM), Melaka, Malaysia

 

Nazirah Abd Hamid
Faculty of Information & Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM), Melaka, Malaysia

 

 

 

 

PDF