Comparison and Evaluation of Information Security Models for Access Control

被引:0
|
作者
Anton, Nicolae [1 ]
Nedelcu, Anisor [1 ]
机构
[1] Transilvania Univ Brasov, Brasov 500068, Romania
关键词
information; information security; models; confidentiality; integrity; availability; access control;
D O I
10.4028/www.scientific.net/AMM.657.708
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.
引用
收藏
页码:708 / 712
页数:5
相关论文
共 50 条
  • [31] The access control in the perception of archivist professionals: a matter of security from institutional information
    Sfreddo, Josiane Ayres
    Flores, Daniel
    [J]. PERSPECTIVAS EM CIENCIA DA INFORMACAO, 2009, 14 (02): : 121 - 140
  • [32] Information Flow-Based Security Levels Assessment for Access Control Systems
    Boulares, Sofiene
    Adi, Kamel
    Logrippo, Luigi
    [J]. E-TECHNOLOGIES, MCETECH 2015, 2015, 209 : 105 - 121
  • [33] Information content security on the Internet:the control model and its evaluation
    FANG BinXing1
    2Institute of Computing Technology
    3Graduate University of Chinese Academy of Sciences
    4National Computer Network Emergency Response Technical Team/Coordination Center of China
    [J]. Science China(Information Sciences), 2010, 53 (01) : 30 - 49
  • [34] Architecture of the Security Access System for Information on the State of the Automatic Control Systems of Aircraft
    Frid, Arkady Isaakovich
    Vulfin, Alexey Mikhailovich
    Berholz, Victoria Viktorovna
    Zakharov, Dmitry Yurievich
    Mironov, Konstantin Valerievich
    [J]. ACTA POLYTECHNICA HUNGARICA, 2020, 17 (08) : 151 - 164
  • [35] Congressional access to national security information
    Fisher, Louis
    [J]. HARVARD JOURNAL ON LEGISLATION, 2008, 45 (01) : 219 - 235
  • [36] Getting the Right Balance: Information Security and Information Access
    Smith, Jennifer
    [J]. LEGAL INFORMATION MANAGEMENT, 2010, 10 (01) : 51 - +
  • [37] Context-aware Security Models for PaaS-enabled Access Control
    Veloudis, Simeon
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Paraskakis, Iraklis
    Mentzas, Gregoris
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, VOL 2 (CLOSER), 2016, : 202 - 212
  • [38] Access security in CDMA2000, including a comparison with UMTS access security
    Rose, G
    Koien, GM
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 19 - 25
  • [39] Access Control Models in Heterogeneous Information Systems: from Conception to Exploitation
    Poniszewska-Maranda, Aneta
    [J]. 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 765 - 770
  • [40] A Novel Evaluation Criteria to Cloud Based Access Control Models
    Younis, A. Younis
    Kifayat, Kashif
    Merabti, Madjid
    [J]. 2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 68 - 73