Table of Content

Open Access iconOpen Access

ARTICLE

Review of Access Control Model

Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2

School of Computer Science and Engineering, Sanjiang University, Nanjing, 210012, China.
International Business Machines Corporation (IBM), New York, USA.

*Corresponding Author: Zhengtao Liu. Email: email.

Journal of Cyber Security 2019, 1(1), 43-50. https://doi.org/10.32604/jcs.2019.06070

Abstract

Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed.

Keywords


Cite This Article

APA Style
Liu, Z., Gu, W., Xia, J. (2019). Review of access control model. Journal of Cyber Security, 1(1), 43-50. https://doi.org/10.32604/jcs.2019.06070
Vancouver Style
Liu Z, Gu W, Xia J. Review of access control model. J Cyber Secur . 2019;1(1):43-50 https://doi.org/10.32604/jcs.2019.06070
IEEE Style
Z. Liu, W. Gu, and J. Xia, “Review of Access Control Model,” J. Cyber Secur. , vol. 1, no. 1, pp. 43-50, 2019. https://doi.org/10.32604/jcs.2019.06070

Citations




cc Copyright © 2019 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 3262

    View

  • 2289

    Download

  • 3

    Like

Related articles

Share Link