Comparison and Evaluation of Information Security Models for Access Control

This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Applied Mechanics and Materials 2014-10, Vol.657 (Engineering Solutions and Technologies in Manufacturing), p.708-712
Hauptverfasser: Anton, Nicolae, Nedelcu, Anișor
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 712
container_issue Engineering Solutions and Technologies in Manufacturing
container_start_page 708
container_title Applied Mechanics and Materials
container_volume 657
creator Anton, Nicolae
Nedelcu, Anișor
description This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.
doi_str_mv 10.4028/www.scientific.net/AMM.657.708
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1864527464</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1864527464</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-21400ec9bc1740ddd3d77dcc4667e9c937abd79b4be6b15385d0345e4e4341333</originalsourceid><addsrcrecordid>eNqNkE1LAzEQhoMfYK39DwuCeNk12WST7EUsxY9iiwf1HLJJFle2SU2yFv-9qRUUT56GYR7emXkAOEOwILDkF5vNpgiqMzZ2bacKa-LFdLksaMUKBvkeGCFKy5wRXu6DSc04hpjjqmQVOfiawbzGmB6B4xBeIaQEET4C9zO3WkvfBWczaXV2_S77QcYuta7N5rZ1frVrH40afBc_sqXTpg9ZmmRTpUwI2czZ6F1_Ag5b2Qcz-a5j8Hxz_TS7yxcPt_PZdJErXPKYl4hAaFTdKMQI1FpjzZhWilDKTK1qzGSjWd2QxtAGVZhXGmJSGWIIJghjPAbnu9y1d2-DCVGsuqBM30tr3BAE4pSkvwklCT39g766wdt0XaLKivOKoS11uaOUdyF404q171bSfwgExda9SO7Fj3uR3IvkXiT3IrlPAVe7gOilDdGol197_hfxCQiBktA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1825885714</pqid></control><display><type>article</type><title>Comparison and Evaluation of Information Security Models for Access Control</title><source>Scientific.net Journals</source><creator>Anton, Nicolae ; Nedelcu, Anișor</creator><creatorcontrib>Anton, Nicolae ; Nedelcu, Anișor</creatorcontrib><description>This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.</description><identifier>ISSN: 1660-9336</identifier><identifier>ISSN: 1662-7482</identifier><identifier>ISBN: 9783038352754</identifier><identifier>ISBN: 3038352756</identifier><identifier>EISSN: 1662-7482</identifier><identifier>DOI: 10.4028/www.scientific.net/AMM.657.708</identifier><language>eng</language><publisher>Zurich: Trans Tech Publications Ltd</publisher><subject>Access control ; Computer information security ; Information systems ; Mathematical models ; Risk management</subject><ispartof>Applied Mechanics and Materials, 2014-10, Vol.657 (Engineering Solutions and Technologies in Manufacturing), p.708-712</ispartof><rights>2014 Trans Tech Publications Ltd</rights><rights>Copyright Trans Tech Publications Ltd. Oct 2014</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c328t-21400ec9bc1740ddd3d77dcc4667e9c937abd79b4be6b15385d0345e4e4341333</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://www.scientific.net/Image/TitleCover/3528?width=600</thumbnail><link.rule.ids>314,778,782,27907,27908</link.rule.ids></links><search><creatorcontrib>Anton, Nicolae</creatorcontrib><creatorcontrib>Nedelcu, Anișor</creatorcontrib><title>Comparison and Evaluation of Information Security Models for Access Control</title><title>Applied Mechanics and Materials</title><description>This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.</description><subject>Access control</subject><subject>Computer information security</subject><subject>Information systems</subject><subject>Mathematical models</subject><subject>Risk management</subject><issn>1660-9336</issn><issn>1662-7482</issn><issn>1662-7482</issn><isbn>9783038352754</isbn><isbn>3038352756</isbn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNkE1LAzEQhoMfYK39DwuCeNk12WST7EUsxY9iiwf1HLJJFle2SU2yFv-9qRUUT56GYR7emXkAOEOwILDkF5vNpgiqMzZ2bacKa-LFdLksaMUKBvkeGCFKy5wRXu6DSc04hpjjqmQVOfiawbzGmB6B4xBeIaQEET4C9zO3WkvfBWczaXV2_S77QcYuta7N5rZ1frVrH40afBc_sqXTpg9ZmmRTpUwI2czZ6F1_Ag5b2Qcz-a5j8Hxz_TS7yxcPt_PZdJErXPKYl4hAaFTdKMQI1FpjzZhWilDKTK1qzGSjWd2QxtAGVZhXGmJSGWIIJghjPAbnu9y1d2-DCVGsuqBM30tr3BAE4pSkvwklCT39g766wdt0XaLKivOKoS11uaOUdyF404q171bSfwgExda9SO7Fj3uR3IvkXiT3IrlPAVe7gOilDdGol197_hfxCQiBktA</recordid><startdate>20141001</startdate><enddate>20141001</enddate><creator>Anton, Nicolae</creator><creator>Nedelcu, Anișor</creator><general>Trans Tech Publications Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SR</scope><scope>7TB</scope><scope>8BQ</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>BENPR</scope><scope>BFMQW</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>KB.</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>PDBOC</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20141001</creationdate><title>Comparison and Evaluation of Information Security Models for Access Control</title><author>Anton, Nicolae ; Nedelcu, Anișor</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-21400ec9bc1740ddd3d77dcc4667e9c937abd79b4be6b15385d0345e4e4341333</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Access control</topic><topic>Computer information security</topic><topic>Information systems</topic><topic>Mathematical models</topic><topic>Risk management</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Anton, Nicolae</creatorcontrib><creatorcontrib>Nedelcu, Anișor</creatorcontrib><collection>CrossRef</collection><collection>Engineered Materials Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central</collection><collection>Continental Europe Database</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>Materials Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Materials Science Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Applied Mechanics and Materials</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Anton, Nicolae</au><au>Nedelcu, Anișor</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Comparison and Evaluation of Information Security Models for Access Control</atitle><jtitle>Applied Mechanics and Materials</jtitle><date>2014-10-01</date><risdate>2014</risdate><volume>657</volume><issue>Engineering Solutions and Technologies in Manufacturing</issue><spage>708</spage><epage>712</epage><pages>708-712</pages><issn>1660-9336</issn><issn>1662-7482</issn><eissn>1662-7482</eissn><isbn>9783038352754</isbn><isbn>3038352756</isbn><abstract>This paper presents an approach to various forms of security and different access levels required in an information system by analyzing mathematical models that can be applied to this field. By describing their structural characteristics and how they find implementation in the study of information security, this paper underlines the necessity, means and effectiveness of information security modeling. The conclusions of this paper highlight the importance of a well-defined security risk management and how achieving this goal provides an opening for future research.</abstract><cop>Zurich</cop><pub>Trans Tech Publications Ltd</pub><doi>10.4028/www.scientific.net/AMM.657.708</doi><tpages>5</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1660-9336
ispartof Applied Mechanics and Materials, 2014-10, Vol.657 (Engineering Solutions and Technologies in Manufacturing), p.708-712
issn 1660-9336
1662-7482
1662-7482
language eng
recordid cdi_proquest_miscellaneous_1864527464
source Scientific.net Journals
subjects Access control
Computer information security
Information systems
Mathematical models
Risk management
title Comparison and Evaluation of Information Security Models for Access Control
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T03%3A17%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Comparison%20and%20Evaluation%20of%20Information%20Security%20Models%20for%20Access%20Control&rft.jtitle=Applied%20Mechanics%20and%20Materials&rft.au=Anton,%20Nicolae&rft.date=2014-10-01&rft.volume=657&rft.issue=Engineering%20Solutions%20and%20Technologies%20in%20Manufacturing&rft.spage=708&rft.epage=712&rft.pages=708-712&rft.issn=1660-9336&rft.eissn=1662-7482&rft.isbn=9783038352754&rft.isbn_list=3038352756&rft_id=info:doi/10.4028/www.scientific.net/AMM.657.708&rft_dat=%3Cproquest_cross%3E1864527464%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1825885714&rft_id=info:pmid/&rfr_iscdi=true