Explore chapters and articles related to this topic
Functional Architectures for Authorization and Asset Management
Published in Denise Bedford, Knowledge Architectures, 2020
The third component of our knowledge authorization architecture is access control (Bertino et al., 2001; Claycomb et al., 2007; Deng & Hong, 2003; Ferraiolo et al., 1999; Howes et al., 2003; Hu et al., 2015; Jin et al., 2012; Joshi et al., 2005; Oh & Park, 2003; Park et al., 2012; Shen & Hong, 2006; Sheresh & Sheresh, 2002; Yang et al., 2007). Access control is a method of guaranteeing that users are who they say they are and that they have the authorization they need to support the organization’s business goals and work. The fundamental concept of access control and management is access rights. We assume that to be considered for access privileges, a stakeholder or consumer has been assigned to an authentication category and can be authenticated. We also assume that we know what they want to access and what they want to do with those assets.
Access Control and Data Security of IoT Applications Using Blockchain Technology
Published in Rajdeep Chakraborty, Anupam Ghosh, Valentina Emilia Bălaş, Ahmed A Elngar, Blockchain, 2023
Usha Divakarla, K. Chandrasekaran
Access control refers to the controlling of access to specific resources or systems. In the world of computers, this mainly refers to the controlling of access to systems, files, codes, and other information stored in any computer device. The term computer device isn’t just limited to a personal computer and can refer to any device in today's world that can store information and may or may not be connected to any network. In case of devices not connected to any network, the term physical access control is more applicable. In this paper, we refer to access control mainly to refer to technical (or logical) access control that refers to any technological (or algorithmic) restrictions that we impose on the way a particular resource is to be accessed.
Security issues in blockchain as access control in electronic health records
Published in Muhammad Arif, Guojun Wang, Mazin Abed Mohammed, Md Tabrez Nafis, Vehicular Ad Hoc Networks, 2023
Aitizaz Ali, Muhammad Fermi Pasha, Ong Hue Fang
The main problem with conventional encryption is that all data are visible to the cloud. The concept of a local domain arises for patients and users to register in order to send and receive digital health services. Leveraging consistently defined attributes, authentication and authorization activities can be executed and administered in the same or separate infrastructures, while maintaining appropriate levels of security. In Figure 1.1, the working of access control models is shown. The access control system consists of objects, subjects, and a set of policies which define access control.
The concept of improving the security of IT systems supporting the storage of knowledge in organizations
Published in Systems Science & Control Engineering, 2022
Paweł Moszczyński, Maciej Moszczyński, Patrycja Bryczek-Wróbel, Michał Kapałka, Tomasz Drozdowski, Jarosław Wróbel
Organizations use the basic security mechanism of access control to ensure controlled processing and knowledge sharing. Traditionally, the definition of ‘access control’ is a decision to authorize access for a user who wants to use specific resources (Park & Sandhu, 2004). In terms of computer security, access control is classically carried out in three main stages – identification, authentication and authorization (Kim & Solomon, 2010, p. 147; Subhani & Amjad, 2020 Chapter 9; Todorov, 2007).