Chapter 4

Different Authorization Mechanism for Software System

Sudhir Kumar Gupta, Deepak Kumar*, Munesh Chandra Trivedi and Kamal Nayan Agarwal

Abstract

Software Quality is a major concern when we develop any application. Data privacy, customer trust, and any long-term goal depend on how well and secure our application and business success also depend upon it. It involves many factors, starting from the design phase and can go to the implementation phase. A major part of software quality is software security. Software security ensures that our software work continuously and correctly in a malicious attack environment. Authorization is the backbone of any application and plays an important role in application security. When a user login into a system, the system should identify how many access rights he has related to each functionality. It is then the responsibility of implemented authorization policy to restrict him or her based upon that. We have some existing authorization techniques, and this paper focuses on the review of authorization techniques with the pros and cons of the existing approach. Comparison between different authorization techniques has also been discussed.

Total Pages: 39-48 (10)

Purchase Chapter  Book Details

RELATED BOOKS

.AIoT and Big Data Analytics for Smart Healthcare Applications.
.Basics of Python Programming: A Quick Guide for Beginners.
.Amazon Web Services: The Definitive Guide for Beginners and Advanced Users.
.The Role of AI in Enhancing IoT-Cloud Applications.