WR As U4 Data
WR As U4 Data
Databases 2
CS 3306
importance. Access control models serve as frameworks that define how users interact with
data and resources within a system. Two prominent models are role-based access control
Role-based access control is a widely used access control model that assigns permissions to
users based on their roles within an organization. In this framework, roles are defined
according to business functions, and permissions are tied to these roles rather than individual
users possibility "can define how a user interacts with data—permitting read-only or
read/write access to certain roles" (McCarthy, 2024, Para 2). This abstraction simplifies the
organization.
2. Users: Individuals who are assigned to one or more roles based on their job
responsorganizatio.
3. Permissions: Access rights associated with roles, which define the actions that can be
performed on resources.
4. Sessions: Instances in which users activate a subset of their assigned roles, allowing for
administrative overhead.
2. Enhanced security: By enforcing the principle of minimum privilege, users can access only
3. Scalability: RBAC is well suited for organizations with large user bases and complex
hierarchical structures.
However, RBAC also has limitations. It may lack the granularity required for some scenarios,
where permissions are tied to roles without taking contextual factors into account.
complex.
Label-Based Access Control, also known as Mandatory Access Control (MAC), is an access
control model that assigns security tags to both users and data. Access decisions are made
based on a comparison of these tags "Access levels are developed in tandem with certain
departments or roles" (Maxsenti, 2021, Para 20). Ensuring that users can only access data for
1. Security tags: attributes assigned to data and users that indicate sensitivity levels or
classifications.
2. Policy rules: predefined rules that govern how security tags are compared to grant or deny
access.
The tag-based access control model works by enforcing strict policies that prevent
1. High security: Strict enforcement of access policies reduces the risk of data breaches.
2. Data sensitivity management: Effectively handling data with varying levels of sensitivity
1. Complex administration: Managing and assigning security labels can be complex and time-
consuming.
2. Low Flexibility: The rigid nature of LBAC may not accommodate dynamic access needs
1. Flexibility vs. Rigidity: RBAC provides flexibility by allowing role assignments to adapt
to organizational changes. In contrast, the rigid structure of LBAC enforces strict access
labels at the data level "it is stricter in terms of hierarchy; Users must match certain criteria
before being granted access to specific data" (Stone, 2020, Para 4). Making it suitable for
environments where data sensitivity varies greatly. RBAC, while effective, may not provide
careful management of security labels and policies, which can increase administrative effort.
4. Use Cases: RBAC is commonly used in commercial sectors where roles and
are critical.
Both RBAC and LBAC play essential roles in access control, each designed to suit the needs
of the organization and its specific security requirements. RBAC’s role-focused approach
provides flexibility and ease of management, making it ideal for dynamic environments with
well-defined roles. Conversely, LBAC’s strict tag-based approach ensures strong security for
McCarthy, M. (2024, January 3.( Difference between RBAC vs. ABAC vs. ACL vs. PBAC vs.
Maxsenti, M. (2021, September 16.( What’s the Difference Between Rule-based Access
Control and Role-based Access Control? (+ 2 Other Access Control Types). Getgenea.
https://www.getgenea.com/blog/types-of-access-control/.
https://medium.com/%40gelferstone/role-based-access-control-rbac-b43b1cc03b73.