Comparison and Evaluation of Information Security Models for Access Control
This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information s...
Gespeichert in:
Veröffentlicht in: | Applied Mechanics and Materials 2014-10, Vol.657 (Engineering Solutions and Technologies in Manufacturing), p.708-712 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 712 |
---|---|
container_issue | Engineering Solutions and Technologies in Manufacturing |
container_start_page | 708 |
container_title | Applied Mechanics and Materials |
container_volume | 657 |
creator | Anton, Nicolae Nedelcu, Anișor |
description | This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research. |
doi_str_mv | 10.4028/www.scientific.net/AMM.657.708 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1864527464</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1864527464</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-21400ec9bc1740ddd3d77dcc4667e9c937abd79b4be6b15385d0345e4e4341333</originalsourceid><addsrcrecordid>eNqNkE1LAzEQhoMfYK39DwuCeNk12WST7EUsxY9iiwf1HLJJFle2SU2yFv-9qRUUT56GYR7emXkAOEOwILDkF5vNpgiqMzZ2bacKa-LFdLksaMUKBvkeGCFKy5wRXu6DSc04hpjjqmQVOfiawbzGmB6B4xBeIaQEET4C9zO3WkvfBWczaXV2_S77QcYuta7N5rZ1frVrH40afBc_sqXTpg9ZmmRTpUwI2czZ6F1_Ag5b2Qcz-a5j8Hxz_TS7yxcPt_PZdJErXPKYl4hAaFTdKMQI1FpjzZhWilDKTK1qzGSjWd2QxtAGVZhXGmJSGWIIJghjPAbnu9y1d2-DCVGsuqBM30tr3BAE4pSkvwklCT39g766wdt0XaLKivOKoS11uaOUdyF404q171bSfwgExda9SO7Fj3uR3IvkXiT3IrlPAVe7gOilDdGol197_hfxCQiBktA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1825885714</pqid></control><display><type>article</type><title>Comparison and Evaluation of Information Security Models for Access Control</title><source>Scientific.net Journals</source><creator>Anton, Nicolae ; Nedelcu, Anișor</creator><creatorcontrib>Anton, Nicolae ; Nedelcu, Anișor</creatorcontrib><description>This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.</description><identifier>ISSN: 1660-9336</identifier><identifier>ISSN: 1662-7482</identifier><identifier>ISBN: 9783038352754</identifier><identifier>ISBN: 3038352756</identifier><identifier>EISSN: 1662-7482</identifier><identifier>DOI: 10.4028/www.scientific.net/AMM.657.708</identifier><language>eng</language><publisher>Zurich: Trans Tech Publications Ltd</publisher><subject>Access control ; Computer information security ; Information systems ; Mathematical models ; Risk management</subject><ispartof>Applied Mechanics and Materials, 2014-10, Vol.657 (Engineering Solutions and Technologies in Manufacturing), p.708-712</ispartof><rights>2014 Trans Tech Publications Ltd</rights><rights>Copyright Trans Tech Publications Ltd. Oct 2014</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c328t-21400ec9bc1740ddd3d77dcc4667e9c937abd79b4be6b15385d0345e4e4341333</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://www.scientific.net/Image/TitleCover/3528?width=600</thumbnail><link.rule.ids>314,778,782,27907,27908</link.rule.ids></links><search><creatorcontrib>Anton, Nicolae</creatorcontrib><creatorcontrib>Nedelcu, Anișor</creatorcontrib><title>Comparison and Evaluation of Information Security Models for Access Control</title><title>Applied Mechanics and Materials</title><description>This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.</description><subject>Access control</subject><subject>Computer information security</subject><subject>Information systems</subject><subject>Mathematical models</subject><subject>Risk management</subject><issn>1660-9336</issn><issn>1662-7482</issn><issn>1662-7482</issn><isbn>9783038352754</isbn><isbn>3038352756</isbn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNkE1LAzEQhoMfYK39DwuCeNk12WST7EUsxY9iiwf1HLJJFle2SU2yFv-9qRUUT56GYR7emXkAOEOwILDkF5vNpgiqMzZ2bacKa-LFdLksaMUKBvkeGCFKy5wRXu6DSc04hpjjqmQVOfiawbzGmB6B4xBeIaQEET4C9zO3WkvfBWczaXV2_S77QcYuta7N5rZ1frVrH40afBc_sqXTpg9ZmmRTpUwI2czZ6F1_Ag5b2Qcz-a5j8Hxz_TS7yxcPt_PZdJErXPKYl4hAaFTdKMQI1FpjzZhWilDKTK1qzGSjWd2QxtAGVZhXGmJSGWIIJghjPAbnu9y1d2-DCVGsuqBM30tr3BAE4pSkvwklCT39g766wdt0XaLKivOKoS11uaOUdyF404q171bSfwgExda9SO7Fj3uR3IvkXiT3IrlPAVe7gOilDdGol197_hfxCQiBktA</recordid><startdate>20141001</startdate><enddate>20141001</enddate><creator>Anton, Nicolae</creator><creator>Nedelcu, Anișor</creator><general>Trans Tech Publications Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SR</scope><scope>7TB</scope><scope>8BQ</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>BENPR</scope><scope>BFMQW</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>KB.</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>PDBOC</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20141001</creationdate><title>Comparison and Evaluation of Information Security Models for Access Control</title><author>Anton, Nicolae ; Nedelcu, Anișor</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-21400ec9bc1740ddd3d77dcc4667e9c937abd79b4be6b15385d0345e4e4341333</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Access control</topic><topic>Computer information security</topic><topic>Information systems</topic><topic>Mathematical models</topic><topic>Risk management</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Anton, Nicolae</creatorcontrib><creatorcontrib>Nedelcu, Anișor</creatorcontrib><collection>CrossRef</collection><collection>Engineered Materials Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central</collection><collection>Continental Europe Database</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>Materials Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Materials Science Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Applied Mechanics and Materials</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Anton, Nicolae</au><au>Nedelcu, Anișor</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Comparison and Evaluation of Information Security Models for Access Control</atitle><jtitle>Applied Mechanics and Materials</jtitle><date>2014-10-01</date><risdate>2014</risdate><volume>657</volume><issue>Engineering Solutions and Technologies in Manufacturing</issue><spage>708</spage><epage>712</epage><pages>708-712</pages><issn>1660-9336</issn><issn>1662-7482</issn><eissn>1662-7482</eissn><isbn>9783038352754</isbn><isbn>3038352756</isbn><abstract>This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.</abstract><cop>Zurich</cop><pub>Trans Tech Publications Ltd</pub><doi>10.4028/www.scientific.net/AMM.657.708</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1660-9336 |
ispartof | Applied Mechanics and Materials, 2014-10, Vol.657 (Engineering Solutions and Technologies in Manufacturing), p.708-712 |
issn | 1660-9336 1662-7482 1662-7482 |
language | eng |
recordid | cdi_proquest_miscellaneous_1864527464 |
source | Scientific.net Journals |
subjects | Access control Computer information security Information systems Mathematical models Risk management |
title | Comparison and Evaluation of Information Security Models for Access Control |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T03%3A17%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Comparison%20and%20Evaluation%20of%20Information%20Security%20Models%20for%20Access%20Control&rft.jtitle=Applied%20Mechanics%20and%20Materials&rft.au=Anton,%20Nicolae&rft.date=2014-10-01&rft.volume=657&rft.issue=Engineering%20Solutions%20and%20Technologies%20in%20Manufacturing&rft.spage=708&rft.epage=712&rft.pages=708-712&rft.issn=1660-9336&rft.eissn=1662-7482&rft.isbn=9783038352754&rft.isbn_list=3038352756&rft_id=info:doi/10.4028/www.scientific.net/AMM.657.708&rft_dat=%3Cproquest_cross%3E1864527464%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1825885714&rft_id=info:pmid/&rfr_iscdi=true |