This document proposes using role-based access control (RBAC) to improve database intrusion detection. It discusses how RBAC restricts access to databases based on user roles. Administrators who access sensitive attributes would have their audit logs mined to determine attribute sensitivity. This information could then be used to detect intrusions using fewer rules. The document outlines the RBAC model and relationships between users, jobs, and access. It also describes implementing RBAC in 6 steps and using a formula to represent the RBAC access control process to better secure database attributes and detect intrusions.