Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies

Different Authorization Mechanism for Software System

Author(s): Sudhir Kumar Gupta, Deepak Kumar*, Munesh Chandra Trivedi and Kamal Nayan Agarwal

Pp: 39-48 (10)

DOI: 10.2174/9789814998451121010007

* (Excluding Mailing and Handling)

Abstract

Software Quality is a major concern when we develop any application. Data privacy, customer trust, and any long-term goal depend on how well and secure our application and business success also depend upon it. It involves many factors, starting from the design phase and can go to the implementation phase. A major part of software quality is software security. Software security ensures that our software work continuously and correctly in a malicious attack environment. Authorization is the backbone of any application and plays an important role in application security. When a user login into a system, the system should identify how many access rights he has related to each functionality. It is then the responsibility of implemented authorization policy to restrict him or her based upon that. We have some existing authorization techniques, and this paper focuses on the review of authorization techniques with the pros and cons of the existing approach. Comparison between different authorization techniques has also been discussed.


Keywords: Authentication, Authorization, Data, Privacy, Security, Software Quality.

Related Journals
Related Books
© 2024 Bentham Science Publishers | Privacy Policy