On enhancing network security with role-based access control

dc.contributor.author Mubiru, Hassan
dc.date.accessioned 2012-10-04T13:34:49Z
dc.date.available 2012-10-04T13:34:49Z
dc.date.issued 2007-09
dc.description A Project report submitted to School of Graduate Studies in partial fulfillment of the requirements for the award of Master of Science in Data Communication and Software Engineering of Makerere University. en_US
dc.description.abstract People in an enterprise should not be allowed to simply sit down and start working with a computer; only authorized personnel should be allowed to use the computer and its applications. Furthermore, authorised users should only be allowed to access resources they need to perform their duties. Traditionally, an administrator assigns each user access rights to applications. In assigning the rights, the administrator would then grant all the necessary permissions needed for the person to complete his/her work, while preventing that person from performing any unauthorized work. Using access models such as Discretionary Access Control (DAC) and Access Control Lists (ACLs), the permissions are granted to each individual user. When granting permissions to several users over many applications, DAC and ACL quickly is cumbersome, difficult, and costly to administer. An alternative access model that resolves these issues is Role Based Access Control (RBAC). The basic premise underlying RBAC is that in order to simplify security administration, permissions are assigned to roles rather than users; a user gains permissions by being assigned to a role. Roles can be a way of defining positions in organizations, a collection of responsibilities, or perhaps representing a qualification. RBAC is a proven technique to assign permissions to users via roles. In RBAC, users can be easily reassigned from one role to another, roles can be granted new permissions for new applications as systems come online, and permissions can be revoked with regard to roles as needed. This improves scalability and offer more flexible means for administration of access control. As a means of simplifying security management and enhancing information and network security, a windows-based tool called RBACS was developed in this project, which grants access to computing resources based on a user’s role within an organization. The tool was designed using Visual Studio 2005 on the Microsoft .NET framework. The source code (Visual C) is attached in Appendix for those who might want to expand on this work. en_US
dc.identifier.citation Mubiru, H. (2007). On enhancing network security with role-based access control. Unpublished master's thesis, Makerere University, Kampala, Uganda. en_US
dc.identifier.uri http://hdl.handle.net/10570/789
dc.language.iso en en_US
dc.subject Network security en_US
dc.subject Access control en_US
dc.subject Computer use authorization en_US
dc.title On enhancing network security with role-based access control en_US
dc.type Thesis, masters en_US
Files
Original bundle
Now showing 1 - 2 of 2
No Thumbnail Available
Name:
mubiru-hassan-cit-masters-report.pdf
Size:
524.25 KB
Format:
Adobe Portable Document Format
Description:
Thesis, Masters
No Thumbnail Available
Name:
mubiru-hassan-cit-masters-code.pdfse.pdf
Size:
145.55 KB
Format:
Adobe Portable Document Format
Description:
Appendices
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: