Study of Access Control Models
The core of a company is its information system, and the least influential problem leads to major damages, requiring the implementation of a security policy. A logical security policy or, more precisely, the organization of rights is termed Access Control. This latter ensures two fundamental securit...
Saved in:
Published in | World Congress on Engineering Vol. 2; pp. 1215 - 1220 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
01.01.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The core of a company is its information system, and the least influential problem leads to major damages, requiring the implementation of a security policy. A logical security policy or, more precisely, the organization of rights is termed Access Control. This latter ensures two fundamental security properties namely: condentiality and integrity. besides,to model a better policy, we must pass through an implementation of organizational security policy. A security model is an access control model. In this paper, we propose a basic study of acces control models by giving a deep description of models, and discussing their reinforcements and weaknesses. This will help us to nd the major security problems that exist in information systems, such as the problem of covert channels. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 2078-0958 |