CFP last date
20 January 2025
Reseach Article

A Survey on Access Control Models and Applications

Published on July 2016 by Nancy Ambritta P., Yogita S. Hande, Santosh A. Darade
International Conference on Internet of Things, Next Generation Networks and Cloud Computing
Foundation of Computer Science USA
ICINC2016 - Number 2
July 2016
Authors: Nancy Ambritta P., Yogita S. Hande, Santosh A. Darade
9fae8cd1-a8ea-40d0-93e2-9403dcb2dd35

Nancy Ambritta P., Yogita S. Hande, Santosh A. Darade . A Survey on Access Control Models and Applications. International Conference on Internet of Things, Next Generation Networks and Cloud Computing. ICINC2016, 2 (July 2016), 4-6.

@article{
author = { Nancy Ambritta P., Yogita S. Hande, Santosh A. Darade },
title = { A Survey on Access Control Models and Applications },
journal = { International Conference on Internet of Things, Next Generation Networks and Cloud Computing },
issue_date = { July 2016 },
volume = { ICINC2016 },
number = { 2 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 4-6 },
numpages = 3,
url = { /proceedings/icinc2016/number2/25528-4797/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%A Nancy Ambritta P.
%A Yogita S. Hande
%A Santosh A. Darade
%T A Survey on Access Control Models and Applications
%J International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%@ 0975-8887
%V ICINC2016
%N 2
%P 4-6
%D 2016
%I International Journal of Computer Applications
Abstract

Access control, as the name indicates is a security measure that regulates access to resources/confidential data by verification of access rights (credentials) of users. This paper is a survey of the existing access control mechanisms that enables a novice reader to understand the existing concepts and models, analyze their usage and limitations in order to develop better mechanism by building up on the existing models that will better adapt to meet the changes/advancements in technology. The study will further enable the development of a strong and attack resilient access models that are eventually the need of the hour.

References
  1. Khan, M. F. F. ; Sakamura, K. ," Context-aware access control for clinical information systems", International Conference on Innovations in Information Technology (IIT), IEEE, pp. 123 – 128, 2012 .
  2. http://www. agiledata. org/essays/accessControl. html
  3. Min-A Jeong, Jung-Ja Kim, Yonggwan Won, " A flexible database security system using multiple access control policies", International Conference on Parallel and Distributed Computing, Applications and Technologies, IEEE, pp-236-240, 2003.
  4. BAI Qing-hai, ZHENGYing, "Study on the Access Control Model in Information Security", Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, IEEE, pp. 830-834, 2011.
  5. Yanfang Fan, Zhen Han, Jiqiang Liu, Yong Zhao, "A Mandatory Access Control Model with Enhanced Flexibility", International Conference on Multimedia Information Networking and Security, IEEE, pp. 236-240, , 2009.
  6. Wenrong Zeng, Yuhao Yang, and Bo Luo. "Content-Based Access Control: Use Data Content to Assist Access Control for Large-Scale Content-Centric Databases," IEEE International Conference on Big Data, IEEE, pp. 701-710,2014
  7. https://www. jerichosystems. com/technology/abac. html
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Mandatory Access Control Discretionary Access Control Role-based Access Control Rule-based Access Control Content-based Access Control.