Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο: https://ruomo.lib.uom.gr/handle/7000/661
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DCΤιμήΓλώσσα
dc.contributor.authorVasiliadis, Christos G.-
dc.contributor.authorGeorgiadis, Christos K.-
dc.date.accessioned2020-04-06T05:02:26Z-
dc.date.available2020-04-06T05:02:26Z-
dc.date.issued2017-
dc.identifier10.1145/3136273.3136288en_US
dc.identifier.isbn9781450352857en_US
dc.identifier.urihttps://doi.org/10.1145/3136273.3136288en_US
dc.identifier.urihttps://ruomo.lib.uom.gr/handle/7000/661-
dc.description.abstractWith continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. Access Control (AC) represents the process of mediating every request to services and data, maintained by a system and determining whether the requests should be granted or denied. The AC decision is enforced by a mechanism implementing regulations established by a security policy. Different AC policies can be applied, corresponding to different criteria for defining what should, and what should not be allowed. Over the past few years AC mechanisms have been deployed in diverse enterprises of all sizes. The aforementioned success has led to an abundance of available access control models corresponding to the special needs of every enterprise. In this paper we firstly attempt to stress the importance for every business that uses information systems to incorporate access control mechanisms in its production line. In the framework of investigating the problem of AC, studies have been held on specific issues relating to the configuration and the management of AC methods. We comprehensively study and classify the problem properly discovering and selecting AC mechanisms by reviewing recent research results and secondly analyze and identify the current AC approaches along with its several variants and the corresponding solution strategies. We highlight the advantages, the methods and techniques involved and the challenges of each approach. Finally, we analyze their influence on designing and implementing these approaches in e-commerce environments, discuss the limitations of existing methods and identify new areas of research that can lead to further enrichment of this field.en_US
dc.language.isoenen_US
dc.publisherACMen_US
dc.subjectFRASCATI::Natural sciences::Computer and information sciencesen_US
dc.subject.otheraccess controlen_US
dc.subject.otherelectronic commerceen_US
dc.titleA Survey on Access Control Mechanisms in E-commerce Environmentsen_US
dc.typeConference Paperen_US
dc.contributor.departmentΤμήμα Εφαρμοσμένης Πληροφορικήςen_US
local.identifier.firstpage1en_US
local.identifier.lastpage6en_US
local.identifier.volumetitleProceedings of the 8th Balkan Conference in Informatics on - BCI '17en_US
Εμφανίζεται στις Συλλογές: Τμήμα Εφαρμοσμένης Πληροφορικής

Αρχεία σε αυτό το Τεκμήριο:
Αρχείο Περιγραφή ΜέγεθοςΜορφότυπος 
Georgiadis_AccessControl_Final paper_2017.pdf103,53 kBAdobe PDFΠροβολή/Ανοιγμα


Τα τεκμήρια στο Αποθετήριο προστατεύονται από πνευματικά δικαιώματα, εκτός αν αναφέρεται κάτι διαφορετικό.