Study of Access Control Models

The core of a company is its information system, and the least influential problem leads to major damages, requiring the implementation of a security policy. A logical security policy or, more precisely, the organization of rights is termed Access Control. This latter ensures two fundamental securit...

Full description

Saved in:
Bibliographic Details
Published inWorld Congress on Engineering Vol. 2; pp. 1215 - 1220
Main Authors Ennahbaoui, Mohammed, Elhajji, Said
Format Journal Article
LanguageEnglish
Published 01.01.2013
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The core of a company is its information system, and the least influential problem leads to major damages, requiring the implementation of a security policy. A logical security policy or, more precisely, the organization of rights is termed Access Control. This latter ensures two fundamental security properties namely: condentiality and integrity. besides,to model a better policy, we must pass through an implementation of organizational security policy. A security model is an access control model. In this paper, we propose a basic study of acces control models by giving a deep description of models, and discussing their reinforcements and weaknesses. This will help us to nd the major security problems that exist in information systems, such as the problem of covert channels.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:2078-0958