Table of Content

Open AccessOpen Access

ARTICLE

Review of Access Control Model

Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2

School of Computer Science and Engineering, Sanjiang University, Nanjing, 210012, China.
International Business Machines Corporation (IBM), New York, USA.

*Corresponding Author: Zhengtao Liu. Email: .

Journal of Cyber Security 2019, 1(1), 43-50. https://doi.org/10.32604/jcs.2019.06070

Abstract

Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed.

Keywords


Cite This Article

Z. Liu, W. Gu and J. Xia, "Review of access control model," Journal of Cyber Security, vol. 1, no.1, pp. 43–50, 2019.

Citations




This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1963

    View

  • 1630

    Download

  • 1

    Like

Related articles

Share Link

WeChat scan