Loading

An Elaborative Approach to Enhance Access Control Model: Demostrated by 7-Tier Architecture
Ankur Kumar Shrivastava1, Abhinav Kumar2, Richa Bhatnagar3, Nidhi Chaudhary4, Mariya Khurshid Ansari5, Amod Tiwari6

1Ankur Kumar Shrivastava, CMJ University, Shillong, Meghalaya, India.
2Abhinav Kumar, Mahindra SSG, Mumbai, India.
3Richa Bhatnagar, Department of Information Technology MIET, Meerut, India.
4Nidhi Choudhary, Department of Computer Science MIET, Meerut, India.
5Mariya Khursid Ansari, Department of Computer Science MIET, Meerut, India.
6Amod Tiwari, Department of Computer Science MIET, Meerut, India.
Manuscript received on September 01, 2012. | Revised Manuscript received on September 02, 2012. | Manuscript published on September 05, 2012. | PP: 82-86 | Volume-2 Issue-4, September 2012. | Retrieval Number: D0890072412/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Access control is a security process, which work as a facilitator between every initiated resource and access request to determine whether the system allows or deny the request. Access control is important for preventing theft of data and resources for ensuring that they are safe and well kept at all times. Thus in rapidly growing IT environment, unauthorized access becomes a form of threat. An organization or industry may possess a wealth of critical resources, but those resources are not at all available to each and every employee, customer or partner. Industries and organizations must implement access control mechanism to ensure that each user whether inside or outside of an organization had only necessary access to the required resources. We discuss here various architectures, policies and models for access control, which are trying to illustrate why they are so much crucial for any organizations. In this paper we are providing an elaborative approach to enhance access control architecture. Also we discuss some key aspect for designing access control architecture.
Keywords: MAC (Mandatory access control), DAC (Directory access control), RBAC (Role based access control).