Please use this identifier to cite or link to this item: http://dspace.azjhpc.org/xmlui/handle/123456789/498
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMammadova, Kifayyat-
dc.contributor.authorAhmadov, Tural-
dc.date.accessioned2025-03-30T15:18:08Z-
dc.date.available2025-03-30T15:18:08Z-
dc.date.issued2024-06-07-
dc.identifier.urihttp://dspace.azjhpc.org/xmlui/handle/123456789/498-
dc.description.abstractThis review provides a comprehensive analysis of access management (AM) methods in the field of information security. AM is a key aspect of protecting sensitive data and resources from unauthorized access. Understanding various AM models and mechanisms is crucial for designing effective security solutions. One of the main goals of the study is the diversity of AM approaches, analyzing models from traditional discretionary AM (DAM) and mandatory AM (MAM) to more newly developed models such as role-based AM (RBAM), attribute-based AM (ABAM), and policy-based AM (PBAM). Additionally, enforcement mechanisms like AM Lists (AML) are discussed. This research work is proposed as a valuable resource for researchers, practitioners, and administrators involved in information security and AM decision-making.en_US
dc.language.isoenen_US
dc.publisherAzerbaijan State Oil and Industry Universityen_US
dc.subjectaccess managementen_US
dc.subjectdistributed systemsen_US
dc.subjectinformation securityen_US
dc.titleMANAGING ACCESS IN DISTRIBUTED SYSTEMS: OVERVIEWen_US
dc.typeBooken_US
dc.source.journaltitleInternational Conference on the Topic of Information Technology Trends Dedicated to the 101st Anniversary of Heydar Aliyeven_US
dc.source.volume1en_US
dc.source.issue1en_US
dc.source.beginpage186en_US
dc.source.endpage193en_US
dc.source.numberofpages7en_US
Appears in Collections:International Conference on the Topic of Information Technology Trends Dedicated to the 101st Anniversary of Heydar Aliyev

Files in This Item:
File Description SizeFormat 
komf mater Fin 2025 docx-186-193.pdf454.98 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.