Analysis of Decentralized & Diverse Access Control (DDAC) Architecture

Article ID

CSTNWS31055

Analysis of Decentralized & Diverse Access Control (DDAC) Architecture

Dr. Rajender Nath
Dr. Rajender Nath
Gulshan Ahuja
Gulshan Ahuja Kurukshetra Univesrsity
DOI

Abstract

Access control refers to securing access to the resources and allowing access up to some defined level. This paper presents various approaches implementing access control in an open domain and carries an analysis of decentralized and diverse access control (DDAC) architecture. The DDAC architecture eliminates the role of centralized authority for managing and issuing users’ credentials. It allows the users to keep the right of disclosure of their attributes under the sole control of them and also ensures that the users are not able to modify the confidential credentials which have been registered and verified by various trusted attribute providers. This paper explains the metrics for carrying the analysis and then presents a theoretical and experimental analysis of the DDAC architecture.

Analysis of Decentralized & Diverse Access Control (DDAC) Architecture

Access control refers to securing access to the resources and allowing access up to some defined level. This paper presents various approaches implementing access control in an open domain and carries an analysis of decentralized and diverse access control (DDAC) architecture. The DDAC architecture eliminates the role of centralized authority for managing and issuing users’ credentials. It allows the users to keep the right of disclosure of their attributes under the sole control of them and also ensures that the users are not able to modify the confidential credentials which have been registered and verified by various trusted attribute providers. This paper explains the metrics for carrying the analysis and then presents a theoretical and experimental analysis of the DDAC architecture.

Dr. Rajender Nath
Dr. Rajender Nath
Gulshan Ahuja
Gulshan Ahuja Kurukshetra Univesrsity

No Figures found in article.

Gulshan Ahuja. 2012. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 12 (GJCST Volume 12 Issue E13): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 12 Issue E13
Pg. 31- 35
Classification
Not Found
Article Matrices
Total Views: 10155
Total Downloads: 2686
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Analysis of Decentralized & Diverse Access Control (DDAC) Architecture

Dr. Rajender Nath
Dr. Rajender Nath
Gulshan Ahuja
Gulshan Ahuja Kurukshetra Univesrsity

Research Journals