Advanced Access Control to Information Systems: Requirements, Compliance and Future Directives

  • Jaidi F
N/ACitations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Abstract The swift cadence of Information and Communication Technologies (ICT) is at the ori- gin of a new generation of open, ubiquitous, large-scale, complex, and heterogeneous information systems (IS). Inextricably linked with this evolution, a number of technical, administrative, and social challenges should be urgently addressed. Security and pri- vacy in critical IS are recognized as crucial issues. The access control is well adopted as a typical solution for securing sensitive resources and ensuring authorized interactions within IS. The chapter deals mainly with the thematic of advanced access control to IS and particularly to relational databases. We present a synthesis of the state of the art of access control that encloses a study of research advancements and challenges. We intro- duce and discuss requirements and main characteristics for deploying advanced access control infrastructures. Then, we discuss the problem of the conformity of concrete access control infrastructures, and we propose a conformity management scheme for monitor- ing the compliance between low-level and high-level policies. Finally, we provide and discuss proposals and directives to enhance provably secure and compliant access con- trol schemes as a main characteristic of future IS.

Cite

CITATION STYLE

APA

Jaidi, F. (2017). Advanced Access Control to Information Systems: Requirements, Compliance and Future Directives. In Advances in Security in Computing and Communications. InTech. https://doi.org/10.5772/intechopen.69329

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free