Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Access Control

Handbook of Research on Security Considerations in Cloud Computing
Set of security measures to determine who should have access to the system or part of the system. It is a counter measure against unauthorized access.
Published in Chapter:
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Kashif Munir (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Copyright: © 2015 |Pages: 16
DOI: 10.4018/978-1-4666-8387-7.ch013
Abstract
In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. For these reasons, the requirements for developing cloud applications have increased. Despite having many advantages for IT organizations, cloud has some issues that must be consider during its deployment. The main concerns are security, privacy and trust. These issues arise during the deployment of mostly public cloud infrastructure. In this chapter, security, privacy and trust issues of cloud computing deployment in Saudi Arabia were identified and the solutions to overcome these problems were discussed.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security Issues in Cloud Computing
access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
Full Text Chapter Download: US $37.50 Add to Cart
Trust in an Enterprise World: A Survey
The mechanisms for allowing access to resources, systems or services to authorized persons or other valid subjects and denying unauthorized access.
Full Text Chapter Download: US $37.50 Add to Cart
Security of Electronic Medical Records
Set of security features that control how users and systems communicate and interact with other systems and resources. They protect systems and resources from unauthorized access and can be a component that participates in defining the level of authorisation after an authentication is successful. Access control is extremely important because is one of the 1st lines of defence used to fight against unauthorized access to systems and network resources. Shon Harris, CISSP. All in one CISSP Certification. MCGrawHill, Osbourne, 2003.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy-Aware Access Control
The mechanisms used for enabling access to resources only by authorized entities.
Full Text Chapter Download: US $37.50 Add to Cart
Human Factors in Information Security and Privacy
The process by which system administrators determine who is permitted to gain entry to certain areas of a system or database.
Full Text Chapter Download: US $37.50 Add to Cart
Access Control Frameworks for a Distributed System
An access control is a mechanism to enforce access privileges to different entities in a computing system.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Semantic Interoperation
Access control is a mechanism that allows resource owners to define, manage, and enforce the access conditions for any resource.
Full Text Chapter Download: US $37.50 Add to Cart
Perspectives of Blockchain in Cybersecurity: Applications and Future Developments
A fundamental concept of cybersecurity facilitated through the regulation of who and/or what can view, maintain, and use individual resources within a system.
Full Text Chapter Download: US $37.50 Add to Cart
Architecture for Big Data Storage in Different Cloud Deployment Models
Access Control Management provides access requirements for end users and System Administrators (privileged users) who access system, network and application resources.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Authentication Model for Enterprise Resource Planning Network
The selective restriction of access to a physical or logical resource.
Full Text Chapter Download: US $37.50 Add to Cart
An Interoperable Cross-Context Architecture to Manage Distributed Personal E-Health Information
Access control is the protection of resources with technical, regulatory and organisational measures against access or use by unauthorised entities.
Full Text Chapter Download: US $37.50 Add to Cart
Biometric Authentication for the Cloud Computing
Set of verification attributes which when authenticated against the individual’s parameters define the permission of access in the given context.
Full Text Chapter Download: US $37.50 Add to Cart
Trust Management and Context-Driven Access Control
The ability to limit and control the actions/operations that a legitimate user of a computer system can perform. Access control constrains what a user can do directly, as well what programs executing on behalf of a user are allowed to do.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Privacy in Medical Application Scenario
This includes authentication, authorization and audit with measures such as physical devices, biometric control and monitoring.
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Privilege Management Infrastructure (PMI)
Restriction of access to some resource through the application of a mechanism which grants, denies, or revokes permissions.
Full Text Chapter Download: US $37.50 Add to Cart
Revealing Concepts of a Cloud Deployment Model: A Semantic Exploration of a New Generation of the Cloud
A security measure in cloud computing that regulates and restricts user access to data and resources. Various schemes, including gateway-based, role-based, and purpose-based access controls, address security concerns.
Full Text Chapter Download: US $37.50 Add to Cart
An MDA Compliant Approach for Designing Secure Data Warehouses
Determines what one party will allow another one to do with respect to resources and objects mediated by the former. Access control models are typically composed of a set of authorization rules that regulate access to objects. Each authorization rule usually specifies the subject to which the rule applies, the object to which the authorization refers, the action to which the rule refers, and the sign describing whether the rule states a permission or a denial for the access.
Full Text Chapter Download: US $37.50 Add to Cart
Security Measures for Mobile Ad-Hoc Networks (MANETs)
This is a security mechanism to make sure that only legitimate parties have access to the data they are supposed to have access.
Full Text Chapter Download: US $37.50 Add to Cart
Fundamental Building Blocks for Security Interoperability in e-Business
The process of controlling every request to a system and determining, based on specified rules, whether the request should be granted or denied.
Full Text Chapter Download: US $37.50 Add to Cart
Identity Management
Access control is used to determine what a user can or cannot do in a particular context.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy in Distance Education
Preventing unauthorized use of a resource; that is, controlling who can access the resource, under what conditions the access can occur and what those accessing the resource are allowed to do.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
Ensures that resources are only granted to those users who are entitled to them.
Full Text Chapter Download: US $37.50 Add to Cart
Managing IS Security and Privacy
All security processes and technologies that are responsible for determining and managing legitimate user access to data and system resources.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Privacy in Medical Application Scenario
This includes authentication, authorization and audit with measures such as physical devices, biometric control and monitoring.
Full Text Chapter Download: US $37.50 Add to Cart
Aspect-Oriented Analysis of Security in Distributed Virtual Environment
Access control is to make authorization decision for every request to resources and data of a system, and grant or deny the request. Different access control policies including Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-based Access Control (RBAC) can be applied to achieve security objectives.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR