1,956
16
Research Paper, 2 pages (500 words)

Example of data access control models research paper

Access control models

Access control models are the mechanisms that are used to regulate the access of users to a computer system or information systems. This paper will discuss three access models and discuss the environments in which they best operate in.

The first access model is the role based access control (RBAC). This access control model does not have a specific environment in which it operates. This is to say that it can be implemented in an operating system, application level or network level, or in database level. The privileges that are users have on the network depend on the role that the users play in the organization. The best environment in which the RBAC model works is the network environment. In a network environment, the values of users which are up-to-date must be made available to all servers in the network. If the attributes of a user are kept on a single server, it will mean that server will have to be accessed across the network. This is because another server on the network might require that user attribute. If the user attributes are kept in each server, then each of these attributes will have to be changed if there are changes which are made to the user attributes.

Another access model is the mandatory access control (MAC) model. This model has its origin in the military where an administrator controls what happens in the network. In this system, the privileges are controlled by the administrator. The control is mandatory. This access control is used in an operating system and a database. The best environment that this is used is the database environment. This is because the users are controlled. There are some database objects and commands that are not to be used by non-administrators. The administrators will therefore identify these objects and set privileges about who will use and who are not allowed to use. This access method will help to control the integrity of the data.

The third access control method is discretionary access control method. In this model, the user sets the privileges that other people will have access on according to their discretion. This model works best in operating system environments. This is because users are allowed to create profiles in the operating systems. With these profiles, users are able to share or restrict some objects they own. They will do this at their own discretion.

References

Angelro, D. (2005). Access control models: Authorization mechanisms for database management systems. Rochester: Rochester Institute of Technology.
Benantar, M. (2006). Access control systems: Security, identity management and trust models . New York: Springer.
Bertino, E., Ghinita, G., & Kamra, A. (2011). Access control for databases: Concepts and systems. Washington: Now Publishers Inc.
Chang, S., University, W. S., & Nio, D. (2008). Access control models for XML data and provenance metadata in scientific workflows. New York: ProQuest.
Garcia-Alfaro, J. (2010). Data privacy management and autonomous spontaneous security. New York: Springer.
Popek, G. J. (2003). Access control models. Boston: Harvard University Press.

Thank's for Your Vote!
Example of data access control models research paper. Page 1
Example of data access control models research paper. Page 2
Example of data access control models research paper. Page 3

This work, titled "Example of data access control models research paper" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Research Paper

References

AssignBuster. (2021) 'Example of data access control models research paper'. 14 November.

Reference

AssignBuster. (2021, November 14). Example of data access control models research paper. Retrieved from https://assignbuster.com/example-of-data-access-control-models-research-paper/

References

AssignBuster. 2021. "Example of data access control models research paper." November 14, 2021. https://assignbuster.com/example-of-data-access-control-models-research-paper/.

1. AssignBuster. "Example of data access control models research paper." November 14, 2021. https://assignbuster.com/example-of-data-access-control-models-research-paper/.


Bibliography


AssignBuster. "Example of data access control models research paper." November 14, 2021. https://assignbuster.com/example-of-data-access-control-models-research-paper/.

Work Cited

"Example of data access control models research paper." AssignBuster, 14 Nov. 2021, assignbuster.com/example-of-data-access-control-models-research-paper/.

Get in Touch

Please, let us know if you have any ideas on improving Example of data access control models research paper, or our service. We will be happy to hear what you think: [email protected]