A Systematic Review of Access Control Models: Background, Existing Research, and Challenges

被引:0
作者
Farhadighalati, Nastaran [1 ]
Estrada-Jimenez, Luis A.
Nikghadam-Hojjati, Sanaz
Barata, Jose
机构
[1] Ctr Technol & Syst UNINOVA CTS, NOVA Sch Sci & Technol, P-2829516 Lisbon, Portugal
关键词
Access control; Systematic literature review; Organizations; Databases; Adaptation models; Taxonomy; Object recognition; Market research; Gold; Data security; Access control (AC); access control model (ACM); security; data; requirements; HEALTH RECORDS; PRIVACY; SECURITY; POLICY; INTEROPERABILITY; FRAMEWORK; INTERNET; THINGS;
D O I
10.1109/ACCESS.2025.3533145
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data security has become paramount, especially with the exponential growth of data, the rise of cyber threats, and the increasing prevalence of remote work. Data confidentiality, integrity, and availability are crucial, particularly in sensitive domains like healthcare and cloud computing. While robust access control (AC) is essential, it must be balanced with maintaining operational efficiency. In access control models, there is a general lack of a comprehensive cross-domain overview, insufficient focus on evolving access control requirements, and inadequate analysis of challenges and issues. This paper comprehensively analyzes access control models (ACMs) through a two-pronged approach. First, we conduct a Narrative Literature Review(NLR) to classify traditional ACMs, evaluating their security strengths and weaknesses and compatible security protocols. Second, we perform a Systematic Literature Review (SLR) of emerging ACMs developed over the past decade across various domains. This systematic review has three primary objectives: (1) to introduce and analyze these emerging ACMs, (2) to present their current technological status, and (3) to identify key challenges and promising research directions. By combining these approaches, this paper offers a comprehensive overviewofACMapplications and techniques, identifies existing challenges, and explores future research directions to guide advancements in access control.
引用
收藏
页码:17777 / 17806
页数:30
相关论文
共 169 条
[11]  
Asaf Z, 2014, 2014 INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS AND TECHNOLOGIES (ICOSST), P197, DOI 10.1109/ICOSST.2014.7029344
[12]  
Asmaa K, 2016, INT J ADV COMPUT SC, V7, P1
[13]  
Atlam Hany F., 2018, International Journal of Computer Network and Information Security, V10, P26, DOI 10.5815/ijcnis.2018.01.04
[14]   Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT [J].
Atlam, Hany F. ;
Walters, Robert J. ;
Wills, Gary B. ;
Daniel, Joshua .
MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06) :2545-2557
[15]   Developing an adaptive Risk-based access control model for the Internet of Things [J].
Atlam, Hany F. ;
Alenezi, Ahmed ;
Walters, Robert J. ;
Wills, Gary B. ;
Daniel, Joshua .
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, :655-661
[16]  
Babu Rajeshwari Gadathas Krishna, 2023, 2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN), P672, DOI 10.1109/ICUFN57995.2023.10199371
[17]   Access control in distributed systems [J].
Bacon, J ;
Moody, K .
COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, :21-28
[18]  
Barkley J., 1997, P 2 ACM WORKSH ROL B, P127, DOI [10.1145/266741.266769, DOI 10.1145/266741.266769]
[19]  
Bashir SR, 2024, Arxiv, DOI arXiv:2401.11305
[20]  
Basnet R., 2019, Integration of task-attribute based access control model for mobile workflow authorization and management