Bulgarian academy of sciences


Prospects of development and conclusions


Download 106.42 Kb.
bet6/16
Sana18.06.2023
Hajmi106.42 Kb.
#1587150
1   2   3   4   5   6   7   8   9   ...   16
Bog'liq
Access Control Models

Prospects of development and conclusions


This paper presents a number of access control models and the areas, where they are applied. IBAC, ACLs and DAC are used in operating systems. MAC is applied for military applications. ZBAC is designed for distributed and service-based systems. PBAC has an application in cloud technologies. ReBAC is used for online social networks. TokenBAC is related to distributed applications, blockchain, ubiquitous computing applications, Internet of things and cloud computing. CBAC is used for protection of traffic through firewalls, ubiquitous computing and Internet of things. VBAC is designed for relational databases. RBAC and ABAC are applied in enterprise software.
The access control models considered have been analyzed and compared by a number of parameters: storing the identity of the user, delegation of trust, fine-grained policies, flexibility, object-versioning, scalability, using time in policies, structure, trustworthiness, workflow control, areas of application, and etc.
Prospects of development are expressed in creating hybrid access control models and new access control solutions for the following areas: cloud computing, Internet of things, blockchain, mobile cloud environment, smart collaborative ecosystems, artificial intelligence, data sharing on smart devices and distributed databases.
This analysis is made, in order to develop a new access control model, which is in a separate article. The new model have been designed for enterprise software and information systems.


R e f e r e n c e s


  1. B e l l, D., L. L a P a d u l a. Secure Computer Systems: Mathematical Foundations and Model. Bedford, MA, The Mitre Corporation, 1973.

  2. B i b a, K. Integrity Considerations for Secure Computer Sytems. – In: Technical Report ESD {TR

{76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April 1977.

  1. S c h l e g a l, M. Poster: Shielding AppSPEAR – Enhancing Memory Safety for Trusted Application- level Security Policy Enforcement. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 99-101. https://doi.org/10.1145/3450569.3464396

  2. C l a e y s, T., F. R o u s s e a u, B. T o u r a n c h e a u. S ecuring Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment. – In: Proc. of International Workshop on Secure Internet of Things (SIOT), September 2017, Oslo, Norway. Hal-01596135, 2017, pp. 1-9. DOI: 10.1109/SIoT.2017.00006.

  3. C o v i n g t o n, M., W. L o n g, S. S r i n i v a s a n, A. K. De y, M. A h a m a d, G. D. A b o w d. Securing Context-Aware Applications Using Environment Roles. – In: Proc. of 6th ACM Symposium on Access Control Models and Technologies ’01, Chantilly, Virginia, USA, May 2001, pp. 10-20.


Download 106.42 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   16




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling