A
A
Anton2015-11-04 22:42:06
IT education
Anton, 2015-11-04 22:42:06

Unauthorized access to information?

Good afternoon!
Interested in the topic of unauthorized access to information in the information system. The fact is that the supervisor proposed to develop a new model of access to the database, which stores information (of any kind). After browsing the Internet, I found only that there are three access models: mandated , role-playing and discretionary. So far, only one thought has arisen: to combine all three models and take only the "positive" (strong) properties of these models. Having discussed this idea with the supervisor, I came to the conclusion that it does not pull as a research work, because I did not offer anything new. Perhaps I didn’t see something or didn’t see it, but who has any thoughts on this issue. Are there other access models? Or what can be added to my idea to make it look like a research paper?
PS I must say right away that at the moment we are not talking about any software implementation.

Answer the question

In order to leave comments, you need to log in

1 answer(s)
A
Andrey Fedorov, 2015-11-04
@aliencash

If it doesn't work with the advantages, try to analyze the disadvantages. What is the biggest problem with db access? Such that all available models solve it, but weakly and inefficiently?

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question