Muhammad Umar Aftab, Zhiguang Qin, Zakria, S. Ali, Pirah, Jalaluddin Khan
{"title":"基于角色的访问控制与基于属性的访问控制模型的评价与比较分析","authors":"Muhammad Umar Aftab, Zhiguang Qin, Zakria, S. Ali, Pirah, Jalaluddin Khan","doi":"10.1109/ICCWAMTIP.2018.8632578","DOIUrl":null,"url":null,"abstract":"Access control is used as a mechanism to secure the organizations from internal and external attacks. The implementation of access control is done with the help of different access control models through which RBAC and ABAC are on the top. This paper contains the evaluation, and comparison of RBAC and ABAC models. Authors explained the working criteria as well as the comparative analysis of these models. The comparison is done on more than ten different parameters. Authors also mentioned their strengths and weaknesses for a good understanding of models.","PeriodicalId":117919,"journal":{"name":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"The Evaluation and Comparative Analysis of Role Based Access Control and Attribute Based Access Control Model\",\"authors\":\"Muhammad Umar Aftab, Zhiguang Qin, Zakria, S. Ali, Pirah, Jalaluddin Khan\",\"doi\":\"10.1109/ICCWAMTIP.2018.8632578\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Access control is used as a mechanism to secure the organizations from internal and external attacks. The implementation of access control is done with the help of different access control models through which RBAC and ABAC are on the top. This paper contains the evaluation, and comparison of RBAC and ABAC models. Authors explained the working criteria as well as the comparative analysis of these models. The comparison is done on more than ten different parameters. Authors also mentioned their strengths and weaknesses for a good understanding of models.\",\"PeriodicalId\":117919,\"journal\":{\"name\":\"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCWAMTIP.2018.8632578\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCWAMTIP.2018.8632578","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Evaluation and Comparative Analysis of Role Based Access Control and Attribute Based Access Control Model
Access control is used as a mechanism to secure the organizations from internal and external attacks. The implementation of access control is done with the help of different access control models through which RBAC and ABAC are on the top. This paper contains the evaluation, and comparison of RBAC and ABAC models. Authors explained the working criteria as well as the comparative analysis of these models. The comparison is done on more than ten different parameters. Authors also mentioned their strengths and weaknesses for a good understanding of models.