Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Access Control

Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_289-1

Key Applications

Any data or system applications


In the field of information security, access control (AC) is the selective restriction of access to a resource (e.g., data, system, application, etc.).

Access Control Models

Access control is an effective approach to guarantee confidentiality and privacy of the resource. Figure 1 shows the history of access control models: access control lists, role-based access control, and attribute-based access control.

This is a preview of subscription content, log in to check access.


  1. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of S&P’07, Washington, DC. IEEE Computer Society, pp 321–334Google Scholar
  2. Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: Proceedings of CRYPTO’01, London. Springer, pp 213–229Google Scholar
  3. Ferraiolo DF, Sandhu R, Gavrila S, Richard Kuhn D, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur (TISSEC) 4(3):224–274CrossRefGoogle Scholar
  4. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of CCS’06, New York. ACM, pp 89–98Google Scholar
  5. Hu VC, Ferraiolo D, Kuhn R, Schnitzer A, Sandlin K, Miller R, Scarfone K (2014) Guide to attribute based access control (abac) definition and considerations. NIST Spec Publ 800:162Google Scholar
  6. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47CrossRefGoogle Scholar
  7. Yang K, Jia X and Shen X (2016) Privacy-preserving Data Access Control in the Smart Grid. Cyber Security for Industrial Control Systems: from the viewpoint of close-loop. Peng Cheng, Heng Zhang and Jiming Chen (Eds.), CRCGoogle Scholar

Authors and Affiliations

  1. 1.Department of Computer ScienceThe University of MemphisMemphisUSA

Section editors and affiliations

  • Kui Ren

There are no affiliations available