Access control is implemented to regulate access within a network, or to a resource. Various techniques are used for implementing access control, including authentication, authorisation, passwords, identifying and verifying users, assigning privileges and permissions, and tracking and monitoring access to resources. Access control can be implemented using software, hardware or a combination of both, and is an essential component of any comprehensive cybersecurity strategy.

Further reading:

See also: APPLICATION, INTERNET

Sandhu, R.S. and Samarati, P., 1994. Access control: principle and practice. IEEE Communications Magazine, 32(9), 408, https://doi.org/10.1109/35.312842.

  • Search Google Scholar
  • Export Citation
  • Sandhu, R.S. and Samarati, P., 1994. Access control: principle and practice. IEEE Communications Magazine, 32(9), 408, https://doi.org/10.1109/35.312842.

    • Search Google Scholar
    • Export Citation
Reference & Dictionaries