Reference Hub4
An Overview on Access Control Models

An Overview on Access Control Models

Mouad Mammass, Fattehallah Ghadi
Copyright: © 2015 |Volume: 6 |Issue: 4 |Pages: 11
ISSN: 1942-3594|EISSN: 1942-3608|EISBN13: 9781466677524|DOI: 10.4018/IJAEC.2015100103
Cite Article Cite Article

MLA

Mammass, Mouad, and Fattehallah Ghadi. "An Overview on Access Control Models." IJAEC vol.6, no.4 2015: pp.28-38. http://doi.org/10.4018/IJAEC.2015100103

APA

Mammass, M. & Ghadi, F. (2015). An Overview on Access Control Models. International Journal of Applied Evolutionary Computation (IJAEC), 6(4), 28-38. http://doi.org/10.4018/IJAEC.2015100103

Chicago

Mammass, Mouad, and Fattehallah Ghadi. "An Overview on Access Control Models," International Journal of Applied Evolutionary Computation (IJAEC) 6, no.4: 28-38. http://doi.org/10.4018/IJAEC.2015100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Research in the field of information security systems and access control were initiated in the early seventies by United States Department of Defense, following the emergence of new technical, scientific and social challenges. Since, many models of security have been set up to answer to some specific needs with more or less accuracy in term of security. This manuscript gives a survey on the current security models with a specific classification in term of their use: Access Control, Flow Control and Administration. This manuscript is the subject of an assessment of advantages and drawbacks of access control models cited in literature and also the efficiency of their security policies. Finally, a presentation of the contributions of Flow Control and Administration models that allow the reinforcement of the security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.