Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

A Survey on Access Control Models and Applications

Print
PDF
IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing
© 2016 by IJCA Journal
ICINC 2016 - Number 2
Year of Publication: 2016
Authors:
Nancy Ambritta P.
Yogita S. Hande
Santosh A. Darade

Nancy Ambritta P., Yogita S Hande and Santosh A Darade. Article: A Survey on Access Control Models and Applications. IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing ICINC 2016(2):4-6, July 2016. Full text available. BibTeX

@article{key:article,
	author = {Nancy Ambritta P. and Yogita S. Hande and Santosh A. Darade},
	title = {Article: A Survey on Access Control Models and Applications},
	journal = {IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing},
	year = {2016},
	volume = {ICINC 2016},
	number = {2},
	pages = {4-6},
	month = {July},
	note = {Full text available}
}

Abstract

Access control, as the name indicates is a security measure that regulates access to resources/confidential data by verification of access rights (credentials) of users. This paper is a survey of the existing access control mechanisms that enables a novice reader to understand the existing concepts and models, analyze their usage and limitations in order to develop better mechanism by building up on the existing models that will better adapt to meet the changes/advancements in technology. The study will further enable the development of a strong and attack resilient access models that are eventually the need of the hour.

References

  • Khan, M. F. F. ; Sakamura, K. ," Context-aware access control for clinical information systems", International Conference on Innovations in Information Technology (IIT), IEEE, pp. 123 – 128, 2012 .
  • http://www. agiledata. org/essays/accessControl. html
  • Min-A Jeong, Jung-Ja Kim, Yonggwan Won, " A flexible database security system using multiple access control policies", International Conference on Parallel and Distributed Computing, Applications and Technologies, IEEE, pp-236-240, 2003.
  • BAI Qing-hai, ZHENGYing, "Study on the Access Control Model in Information Security", Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, IEEE, pp. 830-834, 2011.
  • Yanfang Fan, Zhen Han, Jiqiang Liu, Yong Zhao, "A Mandatory Access Control Model with Enhanced Flexibility", International Conference on Multimedia Information Networking and Security, IEEE, pp. 236-240, , 2009.
  • Wenrong Zeng, Yuhao Yang, and Bo Luo. "Content-Based Access Control: Use Data Content to Assist Access Control for Large-Scale Content-Centric Databases," IEEE International Conference on Big Data, IEEE, pp. 701-710,2014
  • https://www. jerichosystems. com/technology/abac. html