The realization of MAC (mandatory access control) in role-based protection syst em is discussed. First, the definition of role and the application in security a re discussed. Then the concept of MAC is introduced and a scheme of role-based protection which realizes MAC is developed, by viewing each of the role contexts as an independent security-level and imposing non-cyclic information flow req uirement.