Please use this identifier to cite or link to this item:
http://dspace.azjhpc.org/xmlui/handle/123456789/498
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mammadova, Kifayyat | - |
dc.contributor.author | Ahmadov, Tural | - |
dc.date.accessioned | 2025-03-30T15:18:08Z | - |
dc.date.available | 2025-03-30T15:18:08Z | - |
dc.date.issued | 2024-06-07 | - |
dc.identifier.uri | http://dspace.azjhpc.org/xmlui/handle/123456789/498 | - |
dc.description.abstract | This review provides a comprehensive analysis of access management (AM) methods in the field of information security. AM is a key aspect of protecting sensitive data and resources from unauthorized access. Understanding various AM models and mechanisms is crucial for designing effective security solutions. One of the main goals of the study is the diversity of AM approaches, analyzing models from traditional discretionary AM (DAM) and mandatory AM (MAM) to more newly developed models such as role-based AM (RBAM), attribute-based AM (ABAM), and policy-based AM (PBAM). Additionally, enforcement mechanisms like AM Lists (AML) are discussed. This research work is proposed as a valuable resource for researchers, practitioners, and administrators involved in information security and AM decision-making. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Azerbaijan State Oil and Industry University | en_US |
dc.subject | access management | en_US |
dc.subject | distributed systems | en_US |
dc.subject | information security | en_US |
dc.title | MANAGING ACCESS IN DISTRIBUTED SYSTEMS: OVERVIEW | en_US |
dc.type | Book | en_US |
dc.source.journaltitle | International Conference on the Topic of Information Technology Trends Dedicated to the 101st Anniversary of Heydar Aliyev | en_US |
dc.source.volume | 1 | en_US |
dc.source.issue | 1 | en_US |
dc.source.beginpage | 186 | en_US |
dc.source.endpage | 193 | en_US |
dc.source.numberofpages | 7 | en_US |
Appears in Collections: | International Conference on the Topic of Information Technology Trends Dedicated to the 101st Anniversary of Heydar Aliyev |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
komf mater Fin 2025 docx-186-193.pdf | 454.98 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.