An Enhanced Access Control Model Based on Trusted Computing
Authors
Kuanmin Hu, GuoYang Cai, Chengsheng Shen
Corresponding Author
Kuanmin Hu
Available Online April 2016.
- DOI
- 10.2991/ameii-16.2016.177How to use a DOI?
- Keywords
- Access Control, Trusted Computing, TPM, Operating System Security
- Abstract
With the increasingly strict requirement for computer system security, access control models have become more complex. Existing models, such as discretionary access control (DAC) model, mandatory access control (MAC) model, role based access control (RBAC) model, and attribute based access control (ABAC) model, all have advantages and disadvantages regarding practicability and security. In addition, there is an inherent security risk in these access control models. The models merely control the access permission, but ignore the verification for the identity credibility of the entities involved in the access.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Kuanmin Hu AU - GuoYang Cai AU - Chengsheng Shen PY - 2016/04 DA - 2016/04 TI - An Enhanced Access Control Model Based on Trusted Computing BT - Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) PB - Atlantis Press SP - 920 EP - 928 SN - 2352-5401 UR - https://doi.org/10.2991/ameii-16.2016.177 DO - 10.2991/ameii-16.2016.177 ID - Hu2016/04 ER -