A Novel Access Control Model Based on the Structure of Applications

Authors

  • Afshin Rezakhani Malek-Ashtar University of Technology, Tehran, Iran
  • Hossein Shirazi Malek-Ashtar University of Technology, Tehran, Iran
  • Naser Modiri Islamic Azad University, Zanjan Branch

DOI:

https://doi.org/10.17762/ijcnis.v8i2.1994

Abstract

Nowadays, access control has an important role in the management of access to resources in the networks and applications. The establishment of access control in applications is important particularly. Traditional methods of access control, manage the users’ access only at data-centric level. In this paper a new model is presented in which the access control in applications is performed not only at data-centric level but also at component and plug-in levels. By applying the proposed model, the execution of plug-ins or components will be authorized only in the case of enrollment process and in the necessary authorities. In addition, users can access to plug-ins and components only in the case of gaining the necessary authorities. By using the proposed model, the access control can be applied based on both operational needs and applications capabilities accurately.

Downloads

Published

2016-08-20 — Updated on 2022-04-17

Versions

How to Cite

Rezakhani, A., Shirazi, H., & Modiri, N. (2022). A Novel Access Control Model Based on the Structure of Applications. International Journal of Communication Networks and Information Security (IJCNIS), 8(2). https://doi.org/10.17762/ijcnis.v8i2.1994 (Original work published August 20, 2016)

Issue

Section

Research Articles