Table of Content

Open Access iconOpen Access


Review of Access Control Model

Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2

School of Computer Science and Engineering, Sanjiang University, Nanjing, 210012, China.
International Business Machines Corporation (IBM), New York, USA.

*Corresponding Author: Zhengtao Liu. Email: email.

Journal of Cyber Security 2019, 1(1), 43-50.


Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed.


Cite This Article

Z. Liu, W. Gu and J. Xia, "Review of access control model," Journal of Cyber Security, vol. 1, no.1, pp. 43–50, 2019.


cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2608


  • 1873


  • 2


Related articles

Share Link