A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
Data security has become paramount, especially with the exponential growth of data, the rise of cyber threats, and the increasing prevalence of remote work. Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While rob...
Saved in:
Main Authors: | Nastaran Farhadighalati, Luis A. Estrada-Jimenez, Sanaz Nikghadam-Hojjati, Jose Barata |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10850915/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Game-based detection method of broken access control vulnerabilities in Web application
by: HE Haitao, et al.
Published: (2024-06-01) -
Application of integration methods between university information systems and access control systems
by: ZHANG Yundong
Published: (2024-11-01) -
Model for attribute based access control
by: LI Xiao-feng1~4, et al.
Published: (2008-01-01) -
Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records
by: Nadeem Yaqub, et al.
Published: (2025-01-01) -
Research progress of access control model and policy in online social networks
by: Tian-zhu CHEN, et al.
Published: (2016-08-01)