An Introduction to Role-Based Access Control