Research Article
An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing
Table 1
Characteristics of MAC, DAC, and RBAC.
| ā | MAC | DAC | RBAC |
| Access authority | System | Owner | Central authority | Criteria of access | Security level | Identity | Role | Strategy | Stiff | Flexible | Flexible | Merits | Secure | Easy implementation, flexible response | Easy management | Demerits | Difficult implementation and management, high cost, and low performance | Possible illegal behavior |
Existence of conflict roles |
|
|