Integrated Intelligent Research(IIR) International Journal of Communication and Networking System Volume: 01 Issue: 01 June 2012,Pages No.46-48 ISSN: 2278-2427 46 Wireless Information Security System Via Role Based Access Control Pattern Use Case Design K.Subramanian 1 , V.Kanhaa 2 , 1 Faculty , Indian Business Academy , Bangalore, 2 Head, Depr of IT ,Bharath University , Chennai Email: onsubbu@gmail.com, drvkannan62@yahoo.com Abstract- Business delivery value added more via security services to the service providers and service users. Organization system developing various models to achieve the security system according to the modern development and technology; which they requires for their own operations and for their interactions within departments, customers and partners. Business securities pattern will be aid to establish a powerful methodology to identify and understand these relationships to maximize the value of security system. This paper presents a study of important business patterns in Roles Right Definition Model Use Cases linking to Object oriented Analysis and Design approach for Secured Internet Information access. Keywords: Internet Information Security, RBAC Pattern, Use case Model I. INTRODUCTION In Modern communication system, all applications are being accessed through wireless systems which includes commerce, medical, manufacturing, and others. Wireless devices have become an extension of corporate databases and individuals. Their security compromises are as serious as any attack to the corporate database and may have damaging effects on the privacy of individuals and the protection of assets of an enterprise. Wireless devices include cellular phones, two-way radios, PDAs, laptop computers and similar. These are normally portable devices with limitations of weight, size, memory, and power. The increase in functions in cellular devices creates new possibilities for attacks in the service system. Standard attacks against the Internet may now take new forms. Lists of vulnerabilities are already available, showing flaws in many existing products. Communicating in the wireless environment has its own issues and challenges. It is characterized by relatively low bandwidth and data rates, as well as higher error rates, and the need for low power consumption (for mobile devices). The mobility of the nodes in cases such as ad hoc networks adds another significant layer of complexity and unpredictability. II. COMMUNICATION SYSTEM SECURITY The security of communication systems can be divided into four sections: Security of the application: This means the security of user applications and standard applications such as email. Security of the devices: “How to protect the physical device in case it is lost or stolen.” Security of the Wireless Technology: “How to protect messages in transit. “ Security of the server that connects to the Internet or other wired network. After this server the information goes to a network with the usual security problems of a wired network. III. WIRELESS APPLICATION ON WEB There are two common approaches for user applications in wireless devices: WAP (Wireless Application Protocol), and applications based on the two standard component approaches, J2ME and .NET. The latter include standard object-oriented applications or applications using web services. Middleware software supports wireless applications at both the client and server sides. Devices using Bluetooth can use Java or.NET. 3. 1 Wireless Application Protocol (WAP) WAP is a thin-client (micro browser) development protocol, specifically designed for development of user applications. WAP uses WML (Wireless Markup Language) and WML Script to develop applications that can be interpreted at the browser and accessed at the server using HTTP. WAP requires a gateway to the wired Internet, and cannot store and process data locally. WAP uses WTLS (Wireless Transport Layer Security). This protocol provides confidentiality, integrity, and authentication and uses RSA cryptography, but can also use Elliptic Curve Cryptography. It is based on the IETF SSL/TLS protocols. WTLS provides security for communications between the WAP wireless device and the WAP gateway (discussed later). Current WAP devices use Class 2 WTLS, which enforces server-side authentication using public key certificates similar to the SSL/TLS protocol. Future Class 3 devices will also allow client–side authentication using certificates. This level will use a WAP Identity Module (WIM), with mandatory support for RSA public keys and optional support for elliptic curve cryptography. 3.2 Web services Web service is a component or set of functions accessible through the web that can be incorporated into an application. Web services expose an XML interface, can be registered and located through a registry; communicate using XML messages using standard web protocols, and support loosely coupled connections between systems. Web services represent the latest approach to distribution and are considered an important