Research Article

An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

Table 1

Characteristics of MAC, DAC, and RBAC.

ā€‰MACDACRBAC

Access authoritySystemOwnerCentral authority
Criteria of accessSecurity levelIdentityRole
StrategyStiffFlexibleFlexible
MeritsSecureEasy implementation,
flexible response
Easy management
DemeritsDifficult implementation and management, high cost, and low performancePossible illegal behavior Existence of conflict roles