SlideShare a Scribd company logo
1 of 14
Access Control Methods: Ensuring
Security and Efficiency
Name of the student
Institution affiliations
Instructor
Course
Date
Introduction
 Access control is a critical practice in ensuring buildings' security by regulating property
access to prevent unauthorized entry.
 In a diverse world, security needs differ across regions and contexts, and understanding
these variations is crucial for effective access control implementation.
 Access control has evolved from the simplicity of traditional locks, and advanced
technological solutions are now integral to modern security practices.
 Efficient system functionality is dependent upon a thorough understanding of device
configurations such as dedicated, shared, and virtual devices.
 Blocking and buffering are crucial optimization strategies for I/O performance.
 This presentation explores the diverse range of access control methods, differences
between dedicated, shared, and virtual devices, and the significance of blocking and
buffering in improving I/O performance.
What is Access Control?
 Access control involves strategically managing
property access to regulate entry and elevate security
measures.
 Diverse encompasses various methods to determine
when and by whom property access is permitted,
providing a flexible and tailored approach.
 Examples of access control tools range from
traditional door locks to advanced biometric scanners,
showcasing the evolution of security technology.
 Access control serves the primary purpose of exerting
authority over entry times and authorized individuals.
Access Control Models
 Access control models serve as the ground for electronic hardware-based systems,
offering a structured approach to manage property access effectively.
 The key distinction in these models lies in how they are determined by user permissions,
influencing the overall level of control and security implemented.
 These models are broadly categorized into two types, addressing physical properties and
governing software permissions, acknowledging the dual nature of access control.
 Understanding this duality is imperative for customizing access control solutions to
specific requirements in the physical or digital field.
The 4 Main Access Control Models
 In access control, four primary models, DAC, MAC, RBAC, and RuBAC, offer diverse and distinct
approaches to managing property access.
 Discretionary Access Control (DAC) allows multiple administrators to simplify access assignments,
but the potential for confusion necessitates a careful balance.
 Mandatory Access Control (MAC), led by a single administrator, prioritizes high security, potentially
leading to a slower approval process.
 Role-Based Access Control (RBAC) efficiently streamlines access based on predefined roles in both
residential and commercial settings.
 Rule-Based Access Control (RBAC) introduces a structure for time-sensitive access, aligning with
local compliance needs and providing flexibility.
 Understanding the unique features of each model is vital for informed decision-making in aligning
access control strategies with specific security requirements and operational needs.
Discretionary Access Control (DAC)
 Discretionary Access Control (DAC) allows multiple administrators to simplify
property access management.
 DAC's strengths lie in its simplicity and user-friendly design, facilitating the
straightforward assignment of access rights to users.
 The model empowers users with control over entry permissions, allowing them to
decide who can access specific areas within the property.
 Despite its user control features, DAC may need help communicating with multiple
administrators, potentially leading to confusion regarding access permissions
 However, effective communication is crucial to maintain a seamless access
management process. Get to know Top-Ranked Colleges in America today!!
Mandatory Access Control (MAC)
 Mandatory Access Control (MAC) establishes a model where a single system
administrator has exclusive control over access permissions.
 This centralized approach prevents overrides or bypasses, maintaining a
structured and controlled database of users with exclusive access to the
property.
 MAC offers the benefit of an organized database managed by a single system
administrator, enhancing security by limiting access approval authority to a
select few.
 However, a potential trade-off is a slower approval process.
Role-Based Access Control (RBAC)
 Role-Based Access Control (RBAC) assigns users specific roles with unique access
permissions.
 Administrators define roles and assign users accordingly, fostering an organized and
efficient approach to property access within the RBAC model.
 RBAC stands out for its efficiency, user-friendly design, and versatility.
 It applies to residential and commercial properties by simplifying access through role
assignments.
 Despite its strengths, challenges may emerge in large organizations where roles require
frequent adjustments.
 Maintaining an up-to-date understanding of roles and their access requirements can pose
difficulties, potentially impacting the scalability of RBAC in expansive settings.
Rule-Based Access Control (RuBAC)
 Rule-Based Access Control (RuBAC) utilizes algorithms to dynamically adjust users'
access permissions based on time or specific conditions.
 RuBAC ensures compliance with local laws by restricting access based on time or
other criteria.
 The dynamic nature of RuBAC enables swift adjustments to access permissions,
providing flexibility in responding to changing circumstances, including security
compromises or the need to restrict access after working hours.
 However, it is vulnerable to setbacks due to the need for more role specificity,
posing challenges for users in residential or commercial properties to enter restricted
areas based on specific roles.
Differences Between Dedicated, Shared, and Virtual
Devices
 Efficient system functionality is dependent upon a thorough understanding of device
configurations.
 Dedicated devices are crucial in system optimization, exclusively assigned to a single
user or process. What are the Challenges Faced by College Students?
 Shared devices introduce a dynamic where multiple users access resources
concurrently, emphasizing collaboration but posing unique challenges.
 Designed through advanced virtualization technologies, virtual devices represent a
hybrid approach, blending attributes of shared and dedicated models.
The Best Access Control Model
 RBAC stands out as the best access control method to consider.
 RBAC is distinguished by its efficiency and user-friendly features, providing a seamless
experience streamlining the access assignment process.
 RBAC is distinguished by its efficiency and user-friendly features, providing a seamless
experience streamlining the access assignment process.
 RBAC simplifies property access management by assigning access based on predefined
roles, offering a balanced and structured approach to diverse security requirements.
 The user-friendliness and adaptability of RBAC make it the best choice
Blocking and Buffering on I/O Performance
 Efficient I/O (Input/Output) performance is fundamental for a
computer system's responsiveness and throughput.
 Blocking, a vital optimization strategy for I/O, involves temporarily
pausing a program until a specific I/O task is completed.
This process minimizes interrupts generated per a data item which can
minimize overheads associated with i/o operations
 Buffering, another critical strategy in I/O optimization, involves
temporarily storing data before processing or transfer.
Buffering help smooth out variations in data rates between the sender and
receiver.
 A thoughtful integration of blocking and buffering emerges as a strategic
imperative for achieving enhanced I/O performance.
Conclusion
 In this presentation, we explored access control models such as Discretionary Access
Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control
(RBAC), and Rule-Based Access Control (RuBAC).
 Each model presents unique features, advantages, and considerations, tailored to
address varied security requirements in different contexts.
 Understanding the unique characteristics of each model is crucial, whether the focus
is on user-friendliness, heightened security, or adaptability in access management.
 The selection process involves tailoring the choice to ensure an optimal balance
between security and operational efficiency.
 Concluded the exploration with the understanding that a well-informed and tailored
selection ensures an effective balance in access control for organizational needs.
References
 Cho, C., Seong, Y., & Won, Y. (2021). Mandatory access control method for windows embedded OS
security. Electronics, 10(20), 2478. doi:https://doi.org/10.3390/electronics10202478
 Golightly, L., Modesti, P., Garcia, R., & Chang, V. (2023). Securing Distributed Systems: A Survey on Access Control
Techniques for Cloud, Blockchain, IoT and SDN. Cyber Security and Applications, 100015.
ttps://doi.org/10.1016/j.csa.2023.100015
 Guo, X., Liu, C., & Su, Z. (2019). A novel OA system access control method based on improved RBAC model. IOP
Conference Series.Materials Science and Engineering, 490(6) doi:https://doi.org/10.1088/1757-899X/490/6/062079
 Haas, G., & Leis, V. (2023). What Modern NVMe Storage Can Do, and How to Exploit It: High-Performance I/O for High-
Performance Storage Engines. Proceedings of the VLDB Endowment, 16(9), 2090-2102.
 Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., & Fang, B. (2020). A survey on access control in the age of internet of things. IEEE
Internet of Things Journal, 7(6), 4682-4696.
 Thantharate, A., Paropkari, R., Walunj, V., Beard, C., & Kankariya, P. (2020, January). Secure5G: A deep learning framework
towards a secure network slicing in 5G and beyond. In 2020 10th annual computing and communication workshop and
conference (CCWC) (pp. 0852-0857). IEEE.
 Wei, J., Ma, Hong, L. X., Wang, F., An, Y., Dong, H. H., Wang, D., . . . Bi, S. (2021). A data access control method based on
blockchain. Journal of Physics: Conference Series, 1828(1) doi:https://doi.org/10.1088/1742-6596/1828/1/012113
 Vijayalakshmi, K., & Jayalakshmi, V. (2021). Shared access control models for big data: a perspective study and analysis.
In Proceedings of International Conference on Intelligent Computing, Information and Control Systems: ICICCS 2020 (pp.
397-410). Springer Singapore. https://doi.org/10.1007/978-981-15-8443-5_33

More Related Content

Similar to Access Control Methods presentation.pptx

Review of access control models for cloud computing
Review of access control models for cloud computingReview of access control models for cloud computing
Review of access control models for cloud computingcsandit
 
REVIEW OF ACCESS CONTROL MODELS FOR CLOUD COMPUTING
REVIEW OF ACCESS CONTROL MODELS FOR CLOUD COMPUTINGREVIEW OF ACCESS CONTROL MODELS FOR CLOUD COMPUTING
REVIEW OF ACCESS CONTROL MODELS FOR CLOUD COMPUTINGcscpconf
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...IJERA Editor
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based accessijsptm
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...riyak40
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudPaaSword EU Project
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data IJECEIAES
 
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...ijcsta
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applicationsiosrjce
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
 
Deep Learning Meets Blockchain for Automated and Secure Access Control
Deep Learning Meets Blockchain for Automated and Secure Access ControlDeep Learning Meets Blockchain for Automated and Secure Access Control
Deep Learning Meets Blockchain for Automated and Secure Access ControlClaraZara1
 
DEEP LEARNING MEETS BLOCKCHAIN FOR AUTOMATED AND SECURE ACCESS CONTROL
DEEP LEARNING MEETS BLOCKCHAIN FOR AUTOMATED AND SECURE ACCESS CONTROLDEEP LEARNING MEETS BLOCKCHAIN FOR AUTOMATED AND SECURE ACCESS CONTROL
DEEP LEARNING MEETS BLOCKCHAIN FOR AUTOMATED AND SECURE ACCESS CONTROLijsptm
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 

Similar to Access Control Methods presentation.pptx (20)

Review of access control models for cloud computing
Review of access control models for cloud computingReview of access control models for cloud computing
Review of access control models for cloud computing
 
REVIEW OF ACCESS CONTROL MODELS FOR CLOUD COMPUTING
REVIEW OF ACCESS CONTROL MODELS FOR CLOUD COMPUTINGREVIEW OF ACCESS CONTROL MODELS FOR CLOUD COMPUTING
REVIEW OF ACCESS CONTROL MODELS FOR CLOUD COMPUTING
 
Access control data security
Access control data securityAccess control data security
Access control data security
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
S5-Authorization
S5-AuthorizationS5-Authorization
S5-Authorization
 
A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...A Framework for Predicate Based Access Control Policies in Infrastructure as ...
A Framework for Predicate Based Access Control Policies in Infrastructure as ...
 
A provenance policy based access
A provenance policy based accessA provenance policy based access
A provenance policy based access
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
 
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data  An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
 
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Exp...
 
A Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web ApplicationsA Survey on Authorization Systems for Web Applications
A Survey on Authorization Systems for Web Applications
 
A017310105
A017310105A017310105
A017310105
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
 
Deep Learning Meets Blockchain for Automated and Secure Access Control
Deep Learning Meets Blockchain for Automated and Secure Access ControlDeep Learning Meets Blockchain for Automated and Secure Access Control
Deep Learning Meets Blockchain for Automated and Secure Access Control
 
DEEP LEARNING MEETS BLOCKCHAIN FOR AUTOMATED AND SECURE ACCESS CONTROL
DEEP LEARNING MEETS BLOCKCHAIN FOR AUTOMATED AND SECURE ACCESS CONTROLDEEP LEARNING MEETS BLOCKCHAIN FOR AUTOMATED AND SECURE ACCESS CONTROL
DEEP LEARNING MEETS BLOCKCHAIN FOR AUTOMATED AND SECURE ACCESS CONTROL
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Access Control Methods presentation.pptx

  • 1. Access Control Methods: Ensuring Security and Efficiency Name of the student Institution affiliations Instructor Course Date
  • 2. Introduction  Access control is a critical practice in ensuring buildings' security by regulating property access to prevent unauthorized entry.  In a diverse world, security needs differ across regions and contexts, and understanding these variations is crucial for effective access control implementation.  Access control has evolved from the simplicity of traditional locks, and advanced technological solutions are now integral to modern security practices.  Efficient system functionality is dependent upon a thorough understanding of device configurations such as dedicated, shared, and virtual devices.  Blocking and buffering are crucial optimization strategies for I/O performance.  This presentation explores the diverse range of access control methods, differences between dedicated, shared, and virtual devices, and the significance of blocking and buffering in improving I/O performance.
  • 3. What is Access Control?  Access control involves strategically managing property access to regulate entry and elevate security measures.  Diverse encompasses various methods to determine when and by whom property access is permitted, providing a flexible and tailored approach.  Examples of access control tools range from traditional door locks to advanced biometric scanners, showcasing the evolution of security technology.  Access control serves the primary purpose of exerting authority over entry times and authorized individuals.
  • 4. Access Control Models  Access control models serve as the ground for electronic hardware-based systems, offering a structured approach to manage property access effectively.  The key distinction in these models lies in how they are determined by user permissions, influencing the overall level of control and security implemented.  These models are broadly categorized into two types, addressing physical properties and governing software permissions, acknowledging the dual nature of access control.  Understanding this duality is imperative for customizing access control solutions to specific requirements in the physical or digital field.
  • 5. The 4 Main Access Control Models  In access control, four primary models, DAC, MAC, RBAC, and RuBAC, offer diverse and distinct approaches to managing property access.  Discretionary Access Control (DAC) allows multiple administrators to simplify access assignments, but the potential for confusion necessitates a careful balance.  Mandatory Access Control (MAC), led by a single administrator, prioritizes high security, potentially leading to a slower approval process.  Role-Based Access Control (RBAC) efficiently streamlines access based on predefined roles in both residential and commercial settings.  Rule-Based Access Control (RBAC) introduces a structure for time-sensitive access, aligning with local compliance needs and providing flexibility.  Understanding the unique features of each model is vital for informed decision-making in aligning access control strategies with specific security requirements and operational needs.
  • 6. Discretionary Access Control (DAC)  Discretionary Access Control (DAC) allows multiple administrators to simplify property access management.  DAC's strengths lie in its simplicity and user-friendly design, facilitating the straightforward assignment of access rights to users.  The model empowers users with control over entry permissions, allowing them to decide who can access specific areas within the property.  Despite its user control features, DAC may need help communicating with multiple administrators, potentially leading to confusion regarding access permissions  However, effective communication is crucial to maintain a seamless access management process. Get to know Top-Ranked Colleges in America today!!
  • 7. Mandatory Access Control (MAC)  Mandatory Access Control (MAC) establishes a model where a single system administrator has exclusive control over access permissions.  This centralized approach prevents overrides or bypasses, maintaining a structured and controlled database of users with exclusive access to the property.  MAC offers the benefit of an organized database managed by a single system administrator, enhancing security by limiting access approval authority to a select few.  However, a potential trade-off is a slower approval process.
  • 8. Role-Based Access Control (RBAC)  Role-Based Access Control (RBAC) assigns users specific roles with unique access permissions.  Administrators define roles and assign users accordingly, fostering an organized and efficient approach to property access within the RBAC model.  RBAC stands out for its efficiency, user-friendly design, and versatility.  It applies to residential and commercial properties by simplifying access through role assignments.  Despite its strengths, challenges may emerge in large organizations where roles require frequent adjustments.  Maintaining an up-to-date understanding of roles and their access requirements can pose difficulties, potentially impacting the scalability of RBAC in expansive settings.
  • 9. Rule-Based Access Control (RuBAC)  Rule-Based Access Control (RuBAC) utilizes algorithms to dynamically adjust users' access permissions based on time or specific conditions.  RuBAC ensures compliance with local laws by restricting access based on time or other criteria.  The dynamic nature of RuBAC enables swift adjustments to access permissions, providing flexibility in responding to changing circumstances, including security compromises or the need to restrict access after working hours.  However, it is vulnerable to setbacks due to the need for more role specificity, posing challenges for users in residential or commercial properties to enter restricted areas based on specific roles.
  • 10. Differences Between Dedicated, Shared, and Virtual Devices  Efficient system functionality is dependent upon a thorough understanding of device configurations.  Dedicated devices are crucial in system optimization, exclusively assigned to a single user or process. What are the Challenges Faced by College Students?  Shared devices introduce a dynamic where multiple users access resources concurrently, emphasizing collaboration but posing unique challenges.  Designed through advanced virtualization technologies, virtual devices represent a hybrid approach, blending attributes of shared and dedicated models.
  • 11. The Best Access Control Model  RBAC stands out as the best access control method to consider.  RBAC is distinguished by its efficiency and user-friendly features, providing a seamless experience streamlining the access assignment process.  RBAC is distinguished by its efficiency and user-friendly features, providing a seamless experience streamlining the access assignment process.  RBAC simplifies property access management by assigning access based on predefined roles, offering a balanced and structured approach to diverse security requirements.  The user-friendliness and adaptability of RBAC make it the best choice
  • 12. Blocking and Buffering on I/O Performance  Efficient I/O (Input/Output) performance is fundamental for a computer system's responsiveness and throughput.  Blocking, a vital optimization strategy for I/O, involves temporarily pausing a program until a specific I/O task is completed. This process minimizes interrupts generated per a data item which can minimize overheads associated with i/o operations  Buffering, another critical strategy in I/O optimization, involves temporarily storing data before processing or transfer. Buffering help smooth out variations in data rates between the sender and receiver.  A thoughtful integration of blocking and buffering emerges as a strategic imperative for achieving enhanced I/O performance.
  • 13. Conclusion  In this presentation, we explored access control models such as Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Rule-Based Access Control (RuBAC).  Each model presents unique features, advantages, and considerations, tailored to address varied security requirements in different contexts.  Understanding the unique characteristics of each model is crucial, whether the focus is on user-friendliness, heightened security, or adaptability in access management.  The selection process involves tailoring the choice to ensure an optimal balance between security and operational efficiency.  Concluded the exploration with the understanding that a well-informed and tailored selection ensures an effective balance in access control for organizational needs.
  • 14. References  Cho, C., Seong, Y., & Won, Y. (2021). Mandatory access control method for windows embedded OS security. Electronics, 10(20), 2478. doi:https://doi.org/10.3390/electronics10202478  Golightly, L., Modesti, P., Garcia, R., & Chang, V. (2023). Securing Distributed Systems: A Survey on Access Control Techniques for Cloud, Blockchain, IoT and SDN. Cyber Security and Applications, 100015. ttps://doi.org/10.1016/j.csa.2023.100015  Guo, X., Liu, C., & Su, Z. (2019). A novel OA system access control method based on improved RBAC model. IOP Conference Series.Materials Science and Engineering, 490(6) doi:https://doi.org/10.1088/1757-899X/490/6/062079  Haas, G., & Leis, V. (2023). What Modern NVMe Storage Can Do, and How to Exploit It: High-Performance I/O for High- Performance Storage Engines. Proceedings of the VLDB Endowment, 16(9), 2090-2102.  Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., & Fang, B. (2020). A survey on access control in the age of internet of things. IEEE Internet of Things Journal, 7(6), 4682-4696.  Thantharate, A., Paropkari, R., Walunj, V., Beard, C., & Kankariya, P. (2020, January). Secure5G: A deep learning framework towards a secure network slicing in 5G and beyond. In 2020 10th annual computing and communication workshop and conference (CCWC) (pp. 0852-0857). IEEE.  Wei, J., Ma, Hong, L. X., Wang, F., An, Y., Dong, H. H., Wang, D., . . . Bi, S. (2021). A data access control method based on blockchain. Journal of Physics: Conference Series, 1828(1) doi:https://doi.org/10.1088/1742-6596/1828/1/012113  Vijayalakshmi, K., & Jayalakshmi, V. (2021). Shared access control models for big data: a perspective study and analysis. In Proceedings of International Conference on Intelligent Computing, Information and Control Systems: ICICCS 2020 (pp. 397-410). Springer Singapore. https://doi.org/10.1007/978-981-15-8443-5_33

Editor's Notes

  1. Access control is the practice of safeguarding building security by regulating property access. In a world where security needs vary, understanding the importance of access control is crucial. Access Control Methods has evolved from simple locks to incorporating advanced technological solutions (Qiu et al., 2020). This presentation navigates through the landscape of access control methods, recognizing the imperative to customize solutions to meet the unique security demands of diverse properties. Exploring into the challenges of access control models, we reveal their potential advantages and disadvantages., differences between dedicated, shared, and virtual devices, and the importance of blocking and buffering in improving I/O performance. You are welcome in this exploration, where understanding the evolution of access control becomes crucial for adapting to the ever-changing landscape of security requirements in different properties. .
  2.   Access control is the strategic management of property access, aiming to regulate entry and enhance security measures (Wei et al., 2021). It entails a variety of methods designed to control when and by whom property access is permitted. Examples of access control tools include traditional door locks, sophisticated video intercom systems, and cutting-edge biometric scanners. Door locks represent a fundamental form of access control, allowing or denying entry based on physical keys or codes. Video intercoms bring communication into play, verifying identities before granting access. Biometric scanners, such as fingerprint or retina recognition, leverage advanced technology to ensure secure access. The primary purpose of access control is to exert authority over entry times and the individuals granted access. This enhances security and provides a means to manage and monitor authorized personnel effectively, offering an advanced approach to safeguarding property.
  3. Access control models form the foundation of electronic hardware-based systems, providing a structured approach to managing property access. The crucial distinction lies in how these models are determined by user permissions, shaping the level of control and security. These models are broadly categorized into two types: those addressing physical properties and those governing software permissions. In physical properties, access control models dictate who can enter a building, room, or designated area. On the software side, these models govern permissions related to digital files and data access (Wei et al., 2021). Understanding this duality is essential for tailoring access control solutions to specific needs, whether in the physical or digital realm. As we progress, we will explore four primary access control models, each with its advantages and disadvantages, to guide the selection of the most suitable approach for diverse security requirements.
  4. In the domain of access control, four primary models that include Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RuBAC), and Rule-Based Access Control (RuBAC)offer distinct approaches. DAC allows multiple administrators with easy assignments but might lead to potential confusion. With a single administrator, MAC prioritizes high security but might result in a slower approval process. RuBAC, being role-based, proves efficient for both residential and commercial applications. RuBAC, with a rule-based structure, facilitates time-sensitive access and aligns with local compliance needs. Understanding these models' distinctive features is essential for selecting the most suitable approach based on specific security requirements and operational considerations (Guo eta l., 2019).
  5. Discretionary Access Control (DAC) is an access control model that allows multiple administrators to assign permissions, simplifying managing property access (Vijayalakshmi & Jayalakshmi, 2021). Users can control and give access based on discretion, contributing to a flexible system. The model's strengths lie in its simplicity and user-friendly nature. DAC facilitates the straightforward access rights assignment, giving users control over who can enter specified areas. However, challenges might arise in communication among multiple administrators, potentially leading to confusion regarding access permissions. While DAC offers user control, effective communication is vital to prevent misunderstandings and ensure a seamless access management process.
  6. Mandatory Access Control (MAC) is an access control model where a single system administrator holds exclusive authority over access permissions. This centralized approach ensures a tightly regulated system, emphasizing security and confidentiality. The system administrator cannot be overridden or bypassed, maintaining a structured and controlled database of users with access to the property. Research by Cho et al. (2023) reveals that MAC offers the advantage of an organized database, as only one system administrator manages user access. This centralized control enhances security, reducing the risk of unauthorized access by limiting the number of individuals with approval authority. However, one potential drawback is the slower approval process. With a single administrator in charge, approving new access requests may take more time, impacting the efficiency of the access management process. This challenge between heightened security and a potentially slower process requires consideration when implementing MAC.
  7.    Role-Based Access Control (RBAC) is an access control model where users are assigned specific roles, each with unique access permissions. According to Guo eta l., 2019, RBAC model streamlines access management, particularly in dynamic environments. Administrators define roles and set users accordingly, facilitating an organized and efficient approach to property access. RBAC stands out for its efficiency, user-friendly nature, and versatility, making it applicable to residential and commercial properties. The assignment of access based on roles simplifies the process and adapts well to diverse property needs. However, potential challenges might arise in large organizations where roles need frequent adjustments. Maintaining an updated understanding of roles and their access requirements can pose challenges, impacting the scalability of RBAC in expansive settings.
  8. Rule-Based Access Control (RuBAC) is an access control model characterized by an algorithm that adjusts users' access permissions based on qualifying factors such as time or specific conditions. RuBAC model ensures compliance with local laws and allows dynamic changes to access approvals (Golightly et al., 2023). RuBAC can restrict access to certain areas after hours or respond to security compromises, showcasing its adaptability in various scenarios. RuBAC offers the advantage of aligning with local laws by restricting access based on time or other criteria. Its dynamic nature allows swift adjustments to access permissions in response to changing circumstances. However, one setback is the need for more role specificity, making it challenging for users in residential or commercial properties to enter restricted areas based on their specific roles. Additionally, the setup and programming of RuBAC can be complex, especially in scenarios where multiple rooms require time-based access.
  9. Structured system functionality depend on a comprehensive grip of device configurations. We explore into the complex differences among dedicated, shared, and virtual devices in this context. Dedicated devices, designated for exclusive usage by a single user or process, offer complete control and dedicated resources for heightened performance (Thantharate et al., 2020). Shared devices, accessible by multiple users concurrently, entail limited control and shared resources, potentially impacting performance. Virtual devices generated through virtualization technologies display features of both shared and dedicated models, emphasizing resource efficiency in accommodating multiple virtual scenarios. This exploration facilitates informed decisions when choosing device configurations and aligning operational needs with resource considerations.
  10. After evaluating the various access control models, Role-Based Access Control (RBAC) stands out as the recommended choice. RBAC combines efficiency with user-friendly features, streamlining the access assignment process. As Guo et al. (2019) highlights, RBAC’s versatility makes it applicable to various properties, proving effective in commercial and residential settings. By assigning access based on predefined roles, RBAC simplifies the management of property access and offers a balanced approach suitable for diverse security requirements. The user-friendliness and adaptability of RBAC make it the best choice for those seeking a comprehensive and efficient access control solution.
  11. Streamlined I/O (Input/Output) performance is crucial for a computer system's responsiveness and throughput, and blocking and buffering are crucial strategies in this optimization. Blocking, temporarily pausing a program until a specific I/O task concludes, enhances efficiency by preventing CPU idling during slow I/O and facilitating synchronization to avoid data inconsistency. Buffering, temporarily storing data before processing or transfer, reduces response time, minimizes wait time for read or write operations, and ensures a continuous data flow. Therefore, according to Hass & Leis (2023), a thoughtful integration of blocking and buffering techniques leads to improved I/O performance, optimizing resource utilization and ensuring a smooth data flow in diverse computing scenarios. 
  12. In conclusion, we've explored the diverse landscape of access control models, including Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Rule-Based Access Control (RBAC). Each model offers distinct features, advantages, and considerations, catering to different security requirements. Organizations must consider the significance of selecting the proper access control model for specific property needs. Our exploration has also shed light on the diverse world of device configurations, encompassing dedicated, shared, and virtual devices. Additionally, we touched upon the crucial strategies of blocking and buffering in the context of I/O performance, emphasizing their roles in preventing CPU idling, synchronizing processes, and reducing latent period.