Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies

Author(s): Sudhir Kumar Gupta, Deepak Kumar*, Munesh Chandra Trivedi and Kamal Nayan Agarwal

DOI: 10.2174/9789814998451121010007

Different Authorization Mechanism for Software System

Pp: 39-48 (10)

Buy Chapters

* (Excluding Mailing and Handling)

  • * (Excluding Mailing and Handling)

Abstract

SHS investigation development is considered from the geographical and historical viewpoint. 3 stages are described. Within Stage 1 the work was carried out in the Department of the Institute of Chemical Physics in Chernogolovka where the scientific discovery had been made. At Stage 2 the interest to SHS arose in different cities and towns of the former USSR. Within Stage 3 SHS entered the international scene. Now SHS processes and products are being studied in more than 50 countries.

Abstract

Software Quality is a major concern when we develop any application. Data privacy, customer trust, and any long-term goal depend on how well and secure our application and business success also depend upon it. It involves many factors, starting from the design phase and can go to the implementation phase. A major part of software quality is software security. Software security ensures that our software work continuously and correctly in a malicious attack environment. Authorization is the backbone of any application and plays an important role in application security. When a user login into a system, the system should identify how many access rights he has related to each functionality. It is then the responsibility of implemented authorization policy to restrict him or her based upon that. We have some existing authorization techniques, and this paper focuses on the review of authorization techniques with the pros and cons of the existing approach. Comparison between different authorization techniques has also been discussed.

Recommended Chapters

We recommend

Favorable 70-S: Investigation Branching Arrow

Authors:Bentham Science Books