The basis of this analysis is to conclude access control models and emphasizing its strong and weak features. These models are proficiently achieving security and privileged access to the subjects when demanded. Examined access control models for this research are Identity Based, Fuzzy, Attribute-based and Hierarchy base access controls. This paper includes a critique of the access control models including a systematic investigation of their key strategies with meta-models and samples. Scientific comparison and empirical correlation of the chosen access control models are done and validated. The preeminent obstacle here is that there is no comprehensive way of experiencing an access control paradigm simply.
Volume 11 | 04-Special Issue
Pages: 799-803