A model for implementing database security using radio frequency identification (rfid) and role - based access control

To state that the computer has found its way into most fields of human interest is saying the obvious. This is because almost all corporate organizations now depend on computers for their day to day operations including the means of storing sensitive data and information vital to the organization. In this computer age, everyone needs a computer to remain relevant and up to date, and this has arguably made the computer to become the most sought after piece of electronic device (albeit for both legitimate and illegitimate use). Most organizations today are networking in order to share resources including databases thereby allowing several computers access the same database. Advantage of this is being taken by criminals as they have become aware of the enormous benefits of the illegal business of gaining access without authorization (hacking) database of organizations. One of the approaches of this is to device means of taking advantage of any idle computer in a remote area to access a common database. The security of remote computer systems from physical hackers is highly desired, in this paper therefore, the Radio frequency identification (RFID) is introduced into computers security using Tags and Readers. The general operations and applications of the RFID, its types and characteristics are discussed, and a framework for this is designed.

Author: 
Nicholas Oluwole Ogini
Download PDF: