MAC, DAC and RBAC (Group Project)
As you have seen in this Week’s materials, there are three candidate authorisation methods (MAC, DAC and RBAC). Each has its own strengths and weaknesses and its own application domain. Each depends on its application domain to choose the suitable authorisation methodology based on the application requirements. For example, military applications require rigorous authorisation methodology, and so some programmers argue that RBAC is not a perfect fit for such an application domain. For this first Group Project Assignment, you will explore these issues.
This Week’s project is a ‘warm-up’. It does not require much research, but it will require a good understanding and collaboration with other team members to compile a decent document for the whole group.
To complete this Assignment:
Briefly analyse the three candidates (MAC, DAC and RBAC) and evaluate their suitability for the following:
Military applications
Online shopping portals
File access rights (for example, the Linux file permission system)
Support your answer with examples, self-experience or existing academic research in the literature. By Day 7 of Week 2, each group member submits the results of the group work (same submission for each team member) to the Turnitin link for this Group Project Assignment. Your paper should be approximately 1 page long, not including references, but you will be graded on the quality of the writing, not the number of pages.