Chapter 4

Different Authorization Mechanism for Software System

Sudhir Kumar Gupta, Deepak Kumar*, Munesh Chandra Trivedi and Kamal Nayan Agarwal

Abstract

Software Quality is a major concern when we develop any application. Data privacy, customer trust, and any long-term goal depend on how well and secure our application and business success also depend upon it. It involves many factors, starting from the design phase and can go to the implementation phase. A major part of software quality is software security. Software security ensures that our software work continuously and correctly in a malicious attack environment. Authorization is the backbone of any application and plays an important role in application security. When a user login into a system, the system should identify how many access rights he has related to each functionality. It is then the responsibility of implemented authorization policy to restrict him or her based upon that. We have some existing authorization techniques, and this paper focuses on the review of authorization techniques with the pros and cons of the existing approach. Comparison between different authorization techniques has also been discussed.

Total Pages: 39-48 (10)

Purchase Chapter  Book Details

RELATED BOOKS

.Handbook of Mobile Application Development: A Guide to Selecting the Right Engineering and Quality Features.
.The Theory of Thin Antennas and Its Use in Antenna Engineering.
.Mathematics Applied in Information Systems.