preview

Basic Concepts Of Access Control System

Good Essays

In any given social network, the number of users might be significant, the number of resources that must be protected might be in millions, and hence the number of access control policies that need to be defined might be in billions. If only one permission is incorrectly granted, a user will be given unsupervised access to information and resources which could jeopardize the security of the entire given social network.
Presently, security of information is an indispensable responsibility for all media keeping and sharing information with others. In practice, all applications employ access control methods to protect their information. Access control identifies activities of legal users and governs every attempt performed by these users to …show more content…

Hence, the following metrics are classified based upon the four categories mentioned above:
1. Ability to combine several related rules. The PBAAC decision engine is able to collect different access control rules, consolidate similar rules and derive a result under the specified condition. These rules can be defined by the controlling user, the target user, and the supervisor of the social network.
2. Ability to combine access control models. Under our approach, two access control models are combined, namely ABAC and PBAC models. By using the ABAC model, access constraints will be defined for each entity, and by using PBAC, policies enforcing access to a resource will be defined. Under our model, policies will be defined by controlling user, the target user, or the supervisor of the social network.
3. Ability to enforce the least privilege principle. Our model includes an entity as supervisor who is the administrator of the social network. The minimum privilege principle will be provided by rules defined by the supervisor. Our model accepts new users with various associated attributes. In order to access control mechanisms supporting the principle of the least privilege, constraints are placed on the attributes belonging to a user.
4. Ability to resolve conflict rules. Rule

Get Access