scholarly journals Access Control Models

2021 ◽  
Vol 21 (4) ◽  
pp. 77-104
Author(s):  
Maria Penelova

Abstract Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models. Many access control models exist. They vary in their design, components, policies and areas of application. With the developing of information technologies, more complex access control models have been created. This paper is concerned with overview and analysis for a number of access control models. First, an overview of access control models is presented. Second, they are analyzed and compared by a number of parameters: storing the identity of the user, delegation of trust, fine-grained policies, flexibility, object-versioning, scalability, using time in policies, structure, trustworthiness, workflow control, areas of application etc. Some of these parameters describe the access control models, while other parameters are important characteristics and components of these models. The results of the comparative analysis are presented in tables. Prospects of development of new models are specified.

2014 ◽  
Vol 989-994 ◽  
pp. 4751-4754
Author(s):  
Yu Lan Zhao ◽  
Chun Feng Jiang

How to prevent illegal users from sharing system resources was one of the main purposes for MAGNET Security Group. This paper introduced some major access control models such as traditional access control models, role-based access control model (RBAC), task-based access control model (TBAC) and role-task-based access control model (T-RBAC). In the end, a feasible scheme PN_T-RBAC was proposed at the base of the T-RBAC model in existence, which was suitable for the coalition environment of personal networks.


2016 ◽  
Vol 2 (1) ◽  
pp. 36
Author(s):  
Eduardo Martins Guerra ◽  
Jefferson O. Silva ◽  
Clovis Torres Fernandes

<p>Authorization in its most basic form can be<br />reduced to a simple question: “May a subject X access an object<br />Y?” The attempt to implement an adequate response to this<br />authorization question has produced many access control models<br />and mechanisms. The development of the authorization<br />mechanisms usually employs frameworks, which usually<br />implements one access control model, as a way of reusing larger<br />portions of software. However, some authorization requirements,<br />present on recent applications, have demanded for software<br />systems to be able to handle security policies of multiple access<br />control models. Industry has resolved this problem in a<br />pragmatic way, by using the framework to solve part of the<br />problem, and mingling business and the remaining authorization<br />concerns into the code. The main goal of this paper is to present a<br />comparative analysis between the existing frameworks developed<br />either within the academic and industry environments. This<br />analysis uses a motivating example to present the main industry<br />frameworks and consider the fulfillment of modularity,<br />extensibility and granularity requirements facing its suitability<br />for the existing access control models. This analysis included the<br />Esfinge Guardian framework, which is an open source<br />framework developed by the authors that provides mechanisms<br />that allows its extension to implement and combine different<br />authorization models.</p>


2020 ◽  
Vol 2020 ◽  
pp. 1-14 ◽  
Author(s):  
Randa Aljably ◽  
Yuan Tian ◽  
Mznah Al-Rodhaan

Nowadays, user’s privacy is a critical matter in multimedia social networks. However, traditional machine learning anomaly detection techniques that rely on user’s log files and behavioral patterns are not sufficient to preserve it. Hence, the social network security should have multiple security measures to take into account additional information to protect user’s data. More precisely, access control models could complement machine learning algorithms in the process of privacy preservation. The models could use further information derived from the user’s profiles to detect anomalous users. In this paper, we implement a privacy preservation algorithm that incorporates supervised and unsupervised machine learning anomaly detection techniques with access control models. Due to the rich and fine-grained policies, our control model continuously updates the list of attributes used to classify users. It has been successfully tested on real datasets, with over 95% accuracy using Bayesian classifier, and 95.53% on receiver operating characteristic curve using deep neural networks and long short-term memory recurrent neural network classifiers. Experimental results show that this approach outperforms other detection techniques such as support vector machine, isolation forest, principal component analysis, and Kolmogorov–Smirnov test.


Sign in / Sign up

Export Citation Format

Share Document