Read about Role Base Access Control (RBAC) models in the two foundation papers by Sandhu and its implementation in the NIST Standard. Shortly discuss proposed RBAC models in relation to user, role management and policies with possible examples from the real life. Discuss which components are still required to implement RBAC for protecting services and resource. Look at the XACML operational model that is claimed to be a generic RBAC implementation. Do you agree with the last statement?
[1] Sandhu, R. & Samarati, P., 1994. “Access Control: Principles and Practice”, IEEE Communication Magazine, September 1994, pp. 40-48. - http://www.cs.vu.nl/~chandag/spring2006/AC_principles.pdf
[2] Sandhu, R., Coyne, E. J., Feinstein, H. L. & Youman, C.E. 1996, "Role-Based Access Control Models", IEEE Computer, February 1996, pp. 38-47 - http://csrc.nist.gov/rbac/sandhu96.pdf
[3] Information Technology - Role Based Access Control, Document Number: ANSI/INCITS 359-2004, InterNational Committee for Information Technology Standards, February 2004, 56 p.