Research Article

An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

Table 1

Characteristics of MAC, DAC, and RBAC.

 MACDACRBAC

Access authoritySystemOwnerCentral authority
Criteria of accessSecurity levelIdentityRole
StrategyStiffFlexibleFlexible
MeritsSecureEasy implementation,
flexible response
Easy management
DemeritsDifficult implementation and management, high cost, and low performancePossible illegal behavior Existence of conflict roles