Skip to main navigation menu Skip to main content Skip to site footer

Peer Reviewed Article

Vol. 6 (2019)

Role-Based Access Control in SAS Programming: Enhancing Security and Authorization

Submitted
17 May 2024
Published
28-03-2019

Abstract

To improve security and authorization protocols, this study investigates the application of Role-Based Access Control (RBAC) in SAS (Statistical Analysis System) programming environments. Determining roles, allocating permissions, enforcing access controls, and assessing the effect of RBAC on security were the study's primary goals. The literature that has already been written, case studies, and best practices around RBAC deployment in SAS systems were examined using a secondary data-based review methodology. The main conclusions emphasize how well RBAC works to increase control granularity, streamline administrative duties, facilitate scalability, bolster auditability and compliance, and bolster overall security postures. Nonetheless, restrictions were noted, highlighting the necessity of precise guidelines and continuous audits. These included role complexity and administrative burden. The significance of creating precise role-based policies and carrying out frequent audits to maximize RBAC effectiveness are among the policy implications. This study emphasizes that RBAC is essential to contemporary data analytics workflows, supporting safe and adequate access control methods in SAS programming environments that comply with legal requirements and organizational goals.

References

  1. Abdunabi, R., Sun, W., Ray, I. (2014). Enforcing Spatio-temporal Access Control in Mobile Applications. Computing. Archives for Informatics and Numerical Computation, 96(4), 313-353. https://doi.org/10.1007/s00607-013-0340-2
  2. Anumandla, S. K. R. (2018). AI-enabled Decision Support Systems and Reciprocal Symmetry: Empowering Managers for Better Business Outcomes. International Journal of Reciprocal Symmetry and Theoretical Physics, 5, 33-41. https://upright.pub/index.php/ijrstp/article/view/129
  3. Khair, M. A. (2018). Security-Centric Software Development: Integrating Secure Coding Practices into the Software Development Lifecycle. Technology & Management Review, 3, 12-26. https://upright.pub/index.php/tmr/article/view/124
  4. Koehler, S., Dhameliya, N., Patel, B., & Anumandla, S. K. R. (2018). AI-Enhanced Cryptocurrency Trading Algorithm for Optimal Investment Strategies. Asian Accounting and Auditing Advancement, 9(1), 101–114. https://4ajournal.com/article/view/91
  5. Liu, Q., Zhang, J. H. (2012). An Audit-Integrated ARBAC Model. Applied Mechanics and Materials, 263-266, 1600. https://doi.org/10.4028/www.scientific.net/AMM.263-266.1600
  6. Luo, Y., Xia, C., Lv, L., Wei, Z., Li, Y. (2015). Modeling, Conflict Detection, and Verification of a New Virtualization Role-based Access Control Framework. Security and Communication Networks, 8(10), 1904-1925. https://doi.org/10.1002/sec.1025
  7. Maddula, S. S. (2018). The Impact of AI and Reciprocal Symmetry on Organizational Culture and Leadership in the Digital Economy. Engineering International, 6(2), 201–210. https://doi.org/10.18034/ei.v6i2.703
  8. Mullangi, K. (2017). Enhancing Financial Performance through AI-driven Predictive Analytics and Reciprocal Symmetry. Asian Accounting and Auditing Advancement, 8(1), 57–66. https://4ajournal.com/article/view/89
  9. Mullangi, K., Maddula, S. S., Shajahan, M. A., & Sandu, A. K. (2018). Artificial Intelligence, Reciprocal Symmetry, and Customer Relationship Management: A Paradigm Shift in Business. Asian Business Review, 8(3), 183–190. https://doi.org/10.18034/abr.v8i3.704
  10. Olarte, C., Pimentel, E., Rueda, C. (2018). A Concurrent Constraint Programming Interpretation of Access Permissions. Theory and Practice of Logic Programming, 18(2), 252-295. https://doi.org/10.1017/S1471068418000017
  11. Omran, E., Grandison, T., Nelson, D., Bokma, A. (2013). A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain. International Journal of Information Security and Privacy, 7(3), 36-52. https://doi.org/10.4018/jisp.2013070103
  12. Pydipalli, R. (2018). Network-Based Approaches in Bioinformatics and Cheminformatics: Leveraging IT for Insights. ABC Journal of Advanced Research, 7(2), 139-150. https://doi.org/10.18034/abcjar.v7i2.743
  13. Rodriguez, M., Tejani, J. G., Pydipalli, R., & Patel, B. (2018). Bioinformatics Algorithms for Molecular Docking: IT and Chemistry Synergy. Asia Pacific Journal of Energy and Environment, 5(2), 113-122. https://doi.org/10.18034/apjee.v5i2.742
  14. Sandu, A. K., Surarapu, P., Khair, M. A., & Mahadasa, R. (2018). Massive MIMO: Revolutionizing Wireless Communication through Massive Antenna Arrays and Beamforming. International Journal of Reciprocal Symmetry and Theoretical Physics, 5, 22-32. https://upright.pub/index.php/ijrstp/article/view/125
  15. Shajahan, M. A. (2018). Fault Tolerance and Reliability in AUTOSAR Stack Development: Redundancy and Error Handling Strategies. Technology & Management Review, 3, 27-45. https://upright.pub/index.php/tmr/article/view/126
  16. Singh, N., Lakhina, U., Jangra, A., Jangra, P. (2017). Verification and Identification Approach to Maintain MVCC in Cloud Computing. International Journal of Cloud Applications and Computing, 7(4), 41-59. https://doi.org/10.4018/IJCAC.2017100103
  17. Tejani, J. G. (2017). Thermoplastic Elastomers: Emerging Trends and Applications in Rubber Manufacturing. Global Disclosure of Economics and Business, 6(2), 133-144. https://doi.org/10.18034/gdeb.v6i2.737
  18. Vorakulpipat, C., Sirapaisan, S., Rattanalerdnusorn, E., Savangsuk, V. (2017). A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives. Security and Communication Networks, 2017. https://doi.org/10.1155/2017/2057260
  19. Wu, R., Hisada, M. (2010). The Architecture and Industry Applications of Web Security in Static and Dynamic Analysis. Journal of Systems and Information Technology, 12(2), 105-119. https://doi.org/10.1108/13287261011042912
  20. Ying, D., Patel, B., & Dhameliya, N. (2017). Managing Digital Transformation: The Role of Artificial Intelligence and Reciprocal Symmetry in Business. ABC Research Alert, 5(3), 67–77. https://doi.org/10.18034/ra.v5i3.659

Similar Articles

1-10 of 31

You may also start an advanced similarity search for this article.