2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2016
DOI: 10.1109/mipro.2016.7522361
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of a rule-based access control framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…A depth of relationship is the shortest path, corresponding to a relationship between two users. Model-transformation enhances flexibility to RuleBAC [46,57].…”
Section: Rule-based Access Controlmentioning
confidence: 99%
“…A depth of relationship is the shortest path, corresponding to a relationship between two users. Model-transformation enhances flexibility to RuleBAC [46,57].…”
Section: Rule-based Access Controlmentioning
confidence: 99%
“…This approach allows the mechanism of access to digital resources to be more flexible and more complex in accordance with the needs of the interaction. Among the many models for Access Control Policy, such as Discretionary Access Control (DAC) [13], mandatory access control (MAC), Access Control List (ACL) [14], and Rule Based Access Control (RBAC) [15] and one of them is the ABAC (Attribute) model Based Access Control) [16]. This model is based on attribute verification and is believed to be an access control model that is adaptive to the access policy needs of various digital resources in the future.…”
Section: Abac (Attribute Base Access Control)mentioning
confidence: 99%
“…Access control is in principle a mechanism to limit operations or action on a computer system only on legitimate users. Next according to [15,16], there are 4 main issues in access control, namely identification, authentication, authorization and access decisions. The short explanation is as following: 1.…”
Section: Access Controlmentioning
confidence: 99%