In information systems, we have to prevent illegal information flow to occur by transactions manipulating objects.
The role-based access control (RBAC) model is widely used in various applications like database systems.
In this paper, we discuss how to prevent illegal information flow to occur in the RBAC model.