CS 3306 Unit 4 Programming Assignment
CS 3306 Unit 4 Programming Assignment
Malan Grobler
CS 3306 Databases 2:
Security Mechanisms
13 December 2023
2
Two different access control models are used to govern and restrict user access to
resources within an information system: Role-Based Access Control (RBAC) and Label-
Based Access Control (LBAC). Let's investigate these ideas and contrast RBAC with LBAC.
A popular access control approach that links permissions to roles and simplifies
administration while cutting maintenance costs is called role-based access control (RBAC)
(Sandhu et al., 1997; Sinclair et al., 2008). According to RBAC, roles are linked to access
privileges, and users are allocated to roles according to the duties of their jobs. By enabling
managing permissions for specific users, this streamlines the management of access control.
Roles
Flexibility
Because of its security and versatility, RBAC is a well-liked access control model that
works well in sophisticated and complicated information systems (Chen & Zhang, 2009; He
et al., 2008).
Permissions
Permissions are associated with roles, determining what actions users in a specific
Scalability
Particularly in large businesses with varied user groups, RBAC is manageable and
scalable. According to Ferraiolo et al. (1999), it offers a productive way to oversee access
Simplicity
The process of access control is made simpler by giving roles priority over specific
user rights.
Since the mid-1990s, groups like the NIST have promoted RBAC schemes, and a
variety of frameworks are available to apply access control based on this concept (Gupta et
al., n.d.).
In contrast, the LBAC paradigm links information resources with sensitivity labels.
The labels indicate the level of sensitivity or classification of the data, and the labels applied
to the data and users determine whether access is allowed or prohibited. LBAC attempts to
grant appropriate access privileges based on assigned labels and is especially significant in
Labels
Granularity
LBAC provides a more granular control over data access based on sensitivity levels.
Comparison
Granularity
Scalability
Flexibility
and rules.
Conclusion
Both RBAC and LBAC have different functions, and how well they work is
determined by the particular security needs of the company. RBAC is a useful tool for role-
centric user access management that is simple to set up and expand. Because of its emphasis
on data sensitivity, LBAC works effectively in settings where stringent data management and
classification are essential. The type of data to be secured, the organization's security policy,
and the required level of access control granularity all influence the decision between RBAC
5
and LBAC. Organizations frequently use a combination of the two models to fulfill various
The well-liked and extensively used RBAC access control architecture offers a
flexible and safe way to manage access control policies while also making administration
easier and maintenance costs lower. RBAC is thought to be more widely used and
appropriate in complicated and distributed situations, even if LBAC also has a function in
Chen, J. and Zhang, T. (2009). Research and implementation of role-based access control
Ferraiolo, D., Barkley, J., & Kuhn, D. (1999). A role-based access control model and
Gupta, S., Mukheriee, T., Venkatasubramanian, K., & Taylor, T. Proximity based access
He, Y., Han, Z., & Du, Y. (2008). Context active rbac and its applications..
https://doi.org/10.1109/isecs.2008.195
Sandhu, R., Bhamidipati, V., Coyne, E., Ganta, S., & Youman, C. (1997). The arbac97 model
Sinclair, S., Smith, S., Trudeau, S., Johnson, M., & Portera, A. (2008). Information risk in
https://doi.org/10.1007/978-3-540-78550-7_11