Comparative Evaluation of Access Control Models

dc.contributor.advisorDimitoglou, George
dc.contributor.authorLangmead, Paige
dc.contributor.departmentHood College Computer Science and Information Technologyen_US
dc.contributor.programComputer Scienceen_US
dc.date.accessioned2022-04-20T19:14:20Z
dc.date.available2022-04-20T19:14:20Z
dc.date.issued2022-04-19
dc.description.abstractIn cybersecurity, access control models dictate what actions a person can perform, which programs they have permission to execute and overall, the level and type of access of information technology resources. This work compares a number of the most widely used access control models and analyzes their suitability of deployment in different contexts. To perform the analysis, several key background access control mechanisms are described and analyzed. The first result from this analysis is the realization that there is no dominant model that can be suitable across all environments. It is therefore important for access control models to be selected that match the needs of a particular environment. The more in depth analysis focuses on the direct comparison of specific access control models, Bell-Lapdula, Biba, Clark and Wilson and Lampson’s Access Matrix. The result from this analysis is that the Biba model is the most robust and most secure integrity model, especially due to its perfect connection with the Bell Lapadula confidentiality model. These findings are significant as comparing the expressive power of access control models is a fundamental problem in information security.en_US
dc.genreTischer Departmental Honors Paperen_US
dc.identifierdoi:10.13016/m2gdrr-yca2
dc.identifier.urihttp://hdl.handle.net/11603/24600
dc.language.isoen_USen_US
dc.relation.isAvailableAtHood College
dc.rightsAttribution-NoDerivs 3.0 United Statesen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nd/3.0/us/*
dc.titleComparative Evaluation of Access Control Modelsen_US
dc.typeTexten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Comparative Evaluation of Access Control Models.pdf
Size:
462.93 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.01 KB
Format:
Item-specific license agreed upon to submission
Description: