2022
DOI: 10.1108/ijwis-04-2022-0077
|View full text |Cite
|
Sign up to set email alerts
|

A systematic literature review for authorization and access control: definitions, strategies and models

Abstract: Purpose Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 66 publications
0
2
0
Order By: Relevance
“…Authorization limits access to a secured component based on a user's access privileges, i.e., they are unable to access files or information that is prohibited by their position within the organization. According to [13], there are various methods for defining access rights, or the necessary elements and how they work together. Three main elements describe an authorization model: Object is the system entity that needs protection (such as a file, database table, or record), Subject is the active entity (such as a user, group, or organizational position) that requests access, and Action specifies what the Subject can do with the Object (e.g.…”
Section: Authentication and Authorizationmentioning
confidence: 99%
“…Authorization limits access to a secured component based on a user's access privileges, i.e., they are unable to access files or information that is prohibited by their position within the organization. According to [13], there are various methods for defining access rights, or the necessary elements and how they work together. Three main elements describe an authorization model: Object is the system entity that needs protection (such as a file, database table, or record), Subject is the active entity (such as a user, group, or organizational position) that requests access, and Action specifies what the Subject can do with the Object (e.g.…”
Section: Authentication and Authorizationmentioning
confidence: 99%
“…A good PACS must meet certain requirements; in particular, it must have sufficient capacity, not create inconvenience to staff and visitors. The acceptable cost of installing and operating PACS is also important [4,5]. Depending on the level of security requirements, different PACS differ in specific technical solutions, configuration features, and the ability to accumulate or use information.…”
Section: Introductionmentioning
confidence: 99%