Popis: |
One of the most important components in information systems security is the Access Control policy. In order to ensure the best Access Control policy, it is mandatory to proceed to a modeling phase that respects a set of indications and criteria of a predefined model. There exists several Access Control models, each with a specific contribution. This paper exposes the results found through a SWOT analysis on the well-known models, and presents the advantages and drawbacks of each model. Then, a comparative table between these models is elaborated, in order to get an overview on the types of problems encountered in Access Control and discover the common vulnerabilities between its models. The discovering of the covert channels is among the main results of this study. |