The access control means the process to record and manage access restrictions and permits forprotecting information in records. This paper emphasizes the control of access and authorization based onthe roles and the data using activities of users as task performers. Also, it requires to gain the necessaryapproval in advance for important tasks such as mass inquiry and change on important information toinfluence the very existence of the whole organization. And then, it suggests that it is necessary to controlsome session of information with non-activity for certain time. Generally, this paper is to explain securityelements of access control through various cases.
[thesis]
Jong-Il Baek
/ 2012
/ Access Control Security Technology for the Protection Vulnerable DB Objects
/ The Graduate School of Venture, Hoseo University
[book]
Jörg Caumanns
/ 2009
/ IHE IT Infrastructure Technical Framework White Paper – Access Control
/ IHE International
[confproc]
Michelle L. Mazurek
/ 2014
/ Toward strong, usable access control for shared distributed data
/ FAST'14 Proceedings of the 12th USENIX conference on File and Storage Technologies
: 89~103
[report]
Peisert, Sean
/ 2013
/ Dynamic, flexible, and optimistic access control
/ Dept. of Computer Science, University of California at Davis
@article{ART001929540}, author={SeongYoon Shin}, title={The Definitions of Security Requirements for Control Access on the Step of Analysis}, journal={Journal of The Korea Society of Computer and Information}, issn={1598-849X}, year={2014}, volume={19}, number={11}, pages={97-103}
TY - JOUR AU - SeongYoon Shin TI - The Definitions of Security Requirements for Control Access on the Step of Analysis JO - Journal of The Korea Society of Computer and Information PY - 2014 VL - 19 IS - 11 PB - The Korean Society Of Computer And Information SP - 97 EP - 103 SN - 1598-849X AB - The access control means the process to record and manage access restrictions and permits forprotecting information in records. This paper emphasizes the control of access and authorization based onthe roles and the data using activities of users as task performers. Also, it requires to gain the necessaryapproval in advance for important tasks such as mass inquiry and change on important information toinfluence the very existence of the whole organization. And then, it suggests that it is necessary to controlsome session of information with non-activity for certain time. Generally, this paper is to explain securityelements of access control through various cases. KW - Access Control;Authority Control;Inquiry and Change;Session;Security Requirements DO - UR - ER -
SeongYoon Shin. (2014). The Definitions of Security Requirements for Control Access on the Step of Analysis. Journal of The Korea Society of Computer and Information, 19(11), 97-103.
SeongYoon Shin. 2014, "The Definitions of Security Requirements for Control Access on the Step of Analysis", Journal of The Korea Society of Computer and Information, vol.19, no.11 pp.97-103.
SeongYoon Shin "The Definitions of Security Requirements for Control Access on the Step of Analysis" Journal of The Korea Society of Computer and Information 19.11 pp.97-103 (2014) : 97.
SeongYoon Shin. The Definitions of Security Requirements for Control Access on the Step of Analysis. 2014; 19(11), 97-103.
SeongYoon Shin. "The Definitions of Security Requirements for Control Access on the Step of Analysis" Journal of The Korea Society of Computer and Information 19, no.11 (2014) : 97-103.
SeongYoon Shin. The Definitions of Security Requirements for Control Access on the Step of Analysis. Journal of The Korea Society of Computer and Information, 19(11), 97-103.
SeongYoon Shin. The Definitions of Security Requirements for Control Access on the Step of Analysis. Journal of The Korea Society of Computer and Information. 2014; 19(11) 97-103.
SeongYoon Shin. The Definitions of Security Requirements for Control Access on the Step of Analysis. 2014; 19(11), 97-103.
SeongYoon Shin. "The Definitions of Security Requirements for Control Access on the Step of Analysis" Journal of The Korea Society of Computer and Information 19, no.11 (2014) : 97-103.