An Overview on Access Control Models
Mouad Mammass and
Fattehallah Ghadi
Additional contact information
Mouad Mammass: Ibn Zohr University, Agadir, Morocco
Fattehallah Ghadi: Ibn Zohr University, Agadir, Morocco
International Journal of Applied Evolutionary Computation (IJAEC), 2015, vol. 6, issue 4, 28-38
Abstract:
Research in the field of information security systems and access control were initiated in the early seventies by United States Department of Defense, following the emergence of new technical, scientific and social challenges. Since, many models of security have been set up to answer to some specific needs with more or less accuracy in term of security. This manuscript gives a survey on the current security models with a specific classification in term of their use: Access Control, Flow Control and Administration. This manuscript is the subject of an assessment of advantages and drawbacks of access control models cited in literature and also the efficiency of their security policies. Finally, a presentation of the contributions of Flow Control and Administration models that allow the reinforcement of the security.
Date: 2015
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJAEC.2015100103 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jaec00:v:6:y:2015:i:4:p:28-38
Access Statistics for this article
International Journal of Applied Evolutionary Computation (IJAEC) is currently edited by Sukhpal Singh Gill
More articles in International Journal of Applied Evolutionary Computation (IJAEC) from IGI Global
Bibliographic data for series maintained by Journal Editor ().