Comparative Evaluation of Access Control Models
dc.contributor.advisor | Dimitoglou, George | |
dc.contributor.author | Langmead, Paige | |
dc.contributor.department | Hood College Computer Science and Information Technology | en_US |
dc.contributor.program | Computer Science | en_US |
dc.date.accessioned | 2022-04-20T19:14:20Z | |
dc.date.available | 2022-04-20T19:14:20Z | |
dc.date.issued | 2022-04-19 | |
dc.description.abstract | In cybersecurity, access control models dictate what actions a person can perform, which programs they have permission to execute and overall, the level and type of access of information technology resources. This work compares a number of the most widely used access control models and analyzes their suitability of deployment in different contexts. To perform the analysis, several key background access control mechanisms are described and analyzed. The first result from this analysis is the realization that there is no dominant model that can be suitable across all environments. It is therefore important for access control models to be selected that match the needs of a particular environment. The more in depth analysis focuses on the direct comparison of specific access control models, Bell-Lapdula, Biba, Clark and Wilson and Lampson’s Access Matrix. The result from this analysis is that the Biba model is the most robust and most secure integrity model, especially due to its perfect connection with the Bell Lapadula confidentiality model. These findings are significant as comparing the expressive power of access control models is a fundamental problem in information security. | en_US |
dc.genre | Tischer Departmental Honors Paper | en_US |
dc.identifier | doi:10.13016/m2gdrr-yca2 | |
dc.identifier.uri | http://hdl.handle.net/11603/24600 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | Hood College | |
dc.rights | Attribution-NoDerivs 3.0 United States | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nd/3.0/us/ | * |
dc.title | Comparative Evaluation of Access Control Models | en_US |
dc.type | Text | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Comparative Evaluation of Access Control Models.pdf
- Size:
- 462.93 KB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 2.01 KB
- Format:
- Item-specific license agreed upon to submission
- Description: