Show simple item record

dc.contributor.authorMubiru, Hassan
dc.date.accessioned2012-10-04T13:34:49Z
dc.date.available2012-10-04T13:34:49Z
dc.date.issued2007-09
dc.identifier.citationMubiru, H. (2007). On enhancing network security with role-based access control. Unpublished master's thesis, Makerere University, Kampala, Uganda.en_US
dc.identifier.urihttp://hdl.handle.net/10570/789
dc.descriptionA Project report submitted to School of Graduate Studies in partial fulfillment of the requirements for the award of Master of Science in Data Communication and Software Engineering of Makerere University.en_US
dc.description.abstractPeople in an enterprise should not be allowed to simply sit down and start working with a computer; only authorized personnel should be allowed to use the computer and its applications. Furthermore, authorised users should only be allowed to access resources they need to perform their duties. Traditionally, an administrator assigns each user access rights to applications. In assigning the rights, the administrator would then grant all the necessary permissions needed for the person to complete his/her work, while preventing that person from performing any unauthorized work. Using access models such as Discretionary Access Control (DAC) and Access Control Lists (ACLs), the permissions are granted to each individual user. When granting permissions to several users over many applications, DAC and ACL quickly is cumbersome, difficult, and costly to administer. An alternative access model that resolves these issues is Role Based Access Control (RBAC). The basic premise underlying RBAC is that in order to simplify security administration, permissions are assigned to roles rather than users; a user gains permissions by being assigned to a role. Roles can be a way of defining positions in organizations, a collection of responsibilities, or perhaps representing a qualification. RBAC is a proven technique to assign permissions to users via roles. In RBAC, users can be easily reassigned from one role to another, roles can be granted new permissions for new applications as systems come online, and permissions can be revoked with regard to roles as needed. This improves scalability and offer more flexible means for administration of access control. As a means of simplifying security management and enhancing information and network security, a windows-based tool called RBACS was developed in this project, which grants access to computing resources based on a user’s role within an organization. The tool was designed using Visual Studio 2005 on the Microsoft .NET framework. The source code (Visual C) is attached in Appendix for those who might want to expand on this work.en_US
dc.language.isoenen_US
dc.subjectNetwork securityen_US
dc.subjectAccess controlen_US
dc.subjectComputer use authorizationen_US
dc.titleOn enhancing network security with role-based access controlen_US
dc.typeThesis, mastersen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record