Authorization Strategies and Classification of Access Control Models

Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng

Research output: Chapter in Book/Report/Conference proceedingConference proceedingspeer-review

Abstract

Access control enforces authorization policies in order to prohibit unauthorized users from performing actions that could trigger a security violation. There exist numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and choose an appropriate one satisfying security needs. This paper provides an overview of authorization strategies and proposes a rough classification of access control models providing examples for each category. In comparison with other comparative studies, we discuss more access control models including the conventional state-of-the-art models and novel ones. We also summarize each of the literature works after selecting the relevant ones focusing on database systems domain or providing a survey, a taxonomy/classification, or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology (NIST). Further studies for extending the list of access control models as well as analysis criteria are planned.
Original languageEnglish
Title of host publicationFuture Data and Security Engineering
PublisherS
Number of pages20
Volume13076
Publication statusPublished - 2021

Publication series

NameLecture Notes in Computer Science (LNCS)

Fields of science

  • 102 Computer Sciences
  • 102015 Information systems
  • 102016 IT security

JKU Focus areas

  • Digital Transformation
  • KnoP-2D

    Auer, D. (Researcher), Mohamed, A. (Researcher) & Küng, J. (PI)

    01.03.201928.02.2022

    Project: Funded researchFFG - Austrian Research Promotion Agency

Cite this