Comparison and Evaluation of Information Security Models for Access Control

被引:0
|
作者
Anton, Nicolae [1 ]
Nedelcu, Anisor [1 ]
机构
[1] Transilvania Univ Brasov, Brasov 500068, Romania
关键词
information; information security; models; confidentiality; integrity; availability; access control;
D O I
10.4028/www.scientific.net/AMM.657.708
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.
引用
收藏
页码:708 / 712
页数:5
相关论文
共 50 条
  • [1] An Access Control Model for Grid Computing Based on Security Information Evaluation
    Xie, Ping
    Zhou, Jiang
    [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 49 - 52
  • [2] Access Control and Information Flow Control for Web Services Security
    Kedjar, Saadia
    Tari, Abdelkamel
    Bertok, Peter
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (01) : 44 - 76
  • [3] Access control models for distributed information systems
    Poniszewska-Maranda, Aneta
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2010, 86 (08): : 155 - 158
  • [4] Formal definition and comparison of access control models
    Habib, Lionel
    Jaume, Mathieu
    Morisset, Charles
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 372 - 381
  • [5] Quantum Information-Flow Security: Noninterference and Access Control
    Ying, Mingsheng
    Feng, Yuan
    Yu, Nengkun
    [J]. 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 130 - 144
  • [6] A mandatory access control policy model for information security requirements
    Leiwo, J
    Gamage, C
    Zheng, YL
    [J]. PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 527 - 538
  • [7] Security of archival information: the access control in state public files
    Sfreddo, Josiane Ayres
    Flores, Daniel
    [J]. PERSPECTIVAS EM CIENCIA DA INFORMACAO, 2012, 17 (02): : 158 - 178
  • [8] Access control coherence of information systems based on security constraints
    Poniszewska-Maranda, Aneta
    [J]. COMPUTER SAFETY, RELIABILTIY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 412 - 425
  • [9] Access control models most used in medical data security
    Campos-Montero, Brian
    Rodriguez-Sandoval, Cesar
    de los Santos, Alberto Mendoza
    [J]. TECNOLOGIA EN MARCHA, 2024, 37 (01):
  • [10] The hybrid model for web services security Access control and information flow control
    Kedjar, Saadia
    Tari, Abdelkamel
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 194 - +