An Overview on Access Control Models

2015 ◽  
Vol 6 (4) ◽  
pp. 28-38 ◽  
Author(s):  
Mouad Mammass ◽  
Fattehallah Ghadi

Research in the field of information security systems and access control were initiated in the early seventies by United States Department of Defense, following the emergence of new technical, scientific and social challenges. Since, many models of security have been set up to answer to some specific needs with more or less accuracy in term of security. This manuscript gives a survey on the current security models with a specific classification in term of their use: Access Control, Flow Control and Administration. This manuscript is the subject of an assessment of advantages and drawbacks of access control models cited in literature and also the efficiency of their security policies. Finally, a presentation of the contributions of Flow Control and Administration models that allow the reinforcement of the security.

2018 ◽  
Vol 9 (4) ◽  
pp. 52-65 ◽  
Author(s):  
Samira Haguouche ◽  
Zahi Jarir

This article aims to ensure a dynamic set up of access control policies across collaborating organizations where these organizations adopt heterogeneous access control models. To attain this objective, this contribution started with a survey on existing access control models, and their specificities on collaboration. Based on this survey, it remains that the topic on access control collaboration still open despite the efforts made. Therefore, in this article a generic representation of access control concepts is proposed. This generic representation considers the process of semantic mapping between policies of heterogeneous access control systems. In this fact an ontology-based semantic mapping is proposed. This mapping has the advantage to optimize the administrators' involvement by combining linguistic-based and upper-ontology based matching techniques with a user-based constraint strategy for ontology matching.


2020 ◽  
Vol 0 (10/2019) ◽  
pp. 31-39
Author(s):  
Bolesław Szafrański ◽  
Rafał Bałazy

The article describes a discussion on the issue of data protection in databases. The discussion attempts to answer the question about the possibility of using a transactional database system as a system capable of data protection in a statistical database. The discussion is preceded by a reminder of the basic issues related to data protection in databases, including reminder of flow control models, access control models and the inference. The key element of the article is the analysis, based on the example of the Oracle database management system, whether data protection mechanisms in transactional databases can be effective in case of data protection in statistical databases.


Author(s):  
Vladislav Vilihura ◽  
Yuriy Gorbenko ◽  
Vitaliy Yesin ◽  
Serhiy Rassomakhin

The paper contains key provisions (requirements) that should be followed when building secure databases using the capabilities of the main formal access control models, such as discretionary access control models, mandatory access control models, role-based access control models. At the same time, it is noted that any security model does not provide protection but only provides the principle of building a secure database, the implementation of which should ensure the security properties inherent in the model. The security of the database is equally determined by: the properties of the model itself (one or more), its (their) adequacy to the threats affecting the system, and how it (they) is correctly implemented(s). The decisive factor in making a decision is always an assessment of a specific situation, which will allow you to make the right choice, including the complex use of formal models.


Author(s):  
S. V. Usov

In this paper the possibility of representing of some types of role-based access control models by object-oriented discretionary access control model is considered. The role-based security models with taxonomic hierarchy are considered. The permissions of the role-based access control model are represented as a set of pairs of object and access right. A hierarchy of classes of the object-oriented HRU model, based on the role-based access control policy, is constructed. Commands of the object-oriented HRU model, corresponding to the reassignment of roles in the original role-based model, are described.


2020 ◽  
Vol 2020 ◽  
pp. 1-14 ◽  
Author(s):  
Randa Aljably ◽  
Yuan Tian ◽  
Mznah Al-Rodhaan

Nowadays, user’s privacy is a critical matter in multimedia social networks. However, traditional machine learning anomaly detection techniques that rely on user’s log files and behavioral patterns are not sufficient to preserve it. Hence, the social network security should have multiple security measures to take into account additional information to protect user’s data. More precisely, access control models could complement machine learning algorithms in the process of privacy preservation. The models could use further information derived from the user’s profiles to detect anomalous users. In this paper, we implement a privacy preservation algorithm that incorporates supervised and unsupervised machine learning anomaly detection techniques with access control models. Due to the rich and fine-grained policies, our control model continuously updates the list of attributes used to classify users. It has been successfully tested on real datasets, with over 95% accuracy using Bayesian classifier, and 95.53% on receiver operating characteristic curve using deep neural networks and long short-term memory recurrent neural network classifiers. Experimental results show that this approach outperforms other detection techniques such as support vector machine, isolation forest, principal component analysis, and Kolmogorov–Smirnov test.


Sign in / Sign up

Export Citation Format

Share Document