2006 1st International Conference on Communication Systems Software &Amp; Middleware
DOI: 10.1109/comswa.2006.1665185
|View full text |Cite
|
Sign up to set email alerts
|

Access Control in Communication Systems

Abstract: Access control is an important component in the security of communication systems. While cryptography has rightfully been a significant component in the design of large scale communication systems, its relation to access control, especially its complementarity, has not often been brought out in full.In many large scale systems, access control and trust management have become important components in the design. In survivable systems, models of group communication systems may have to be integrated with access co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…In RBAC model, since roles are assigned to users, restricting them to perform only certain tasks (Ferraiolo et al, 1999), the iris recognition software requires only restricted time for the matching process and hence iris biometrics is more suited for RBAC model than any other model. Similarly, since NGDM model has eight primitive protection rights with "owner" and "controller" access checks (Gopinath, 2006), fingerprint matching being more advanced and faster than other techniques, this is recommended here. On the other hand, due to the feature of MAC model to deny the users full control over the access to resources that they create, it is mostly commonly applicable for classified sensitive information (ICAO NTWG, 2004).…”
Section: Analysis Of Information Security Models Used In Banking Systemsmentioning
confidence: 99%
“…In RBAC model, since roles are assigned to users, restricting them to perform only certain tasks (Ferraiolo et al, 1999), the iris recognition software requires only restricted time for the matching process and hence iris biometrics is more suited for RBAC model than any other model. Similarly, since NGDM model has eight primitive protection rights with "owner" and "controller" access checks (Gopinath, 2006), fingerprint matching being more advanced and faster than other techniques, this is recommended here. On the other hand, due to the feature of MAC model to deny the users full control over the access to resources that they create, it is mostly commonly applicable for classified sensitive information (ICAO NTWG, 2004).…”
Section: Analysis Of Information Security Models Used In Banking Systemsmentioning
confidence: 99%