Table of Content

Open Access iconOpen Access

ARTICLE

Review of Access Control Model

Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2

School of Computer Science and Engineering, Sanjiang University, Nanjing, 210012, China.
International Business Machines Corporation (IBM), New York, USA.

*Corresponding Author: Zhengtao Liu. Email: email.

Journal of Cyber Security 2019, 1(1), 43-50. https://doi.org/10.32604/jcs.2019.06070

Abstract

Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed.

Keywords


Cite This Article

Z. Liu, W. Gu and J. Xia, "Review of access control model," Journal of Cyber Security, vol. 1, no.1, pp. 43–50, 2019. https://doi.org/10.32604/jcs.2019.06070

Citations




cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2887

    View

  • 2103

    Download

  • 2

    Like

Related articles

Share Link