Research Article
Service-Based Hybrid Access Control Technology with Priority Level for the Internet of Vehicles under the Cloud Architecture
Table 6
Comparison of access control models. (✓ indicates that it has the function, ✗ means not having).
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
∗Cr-Criterion; Cr1- Scalability; Cr2- Context awareness; Cr3- Granular; Cr4- Delegation support; Cr5- Dynamic; Cr6-hierarchies; Cr7- Priority mechanism; Cr8- Adjustable permissions; Cr9- Permission reservation; Cr10- Permission inheritance mechanism; Cr11- Access control model practical running experiments. |