INTEGRATION OF CRYPTOGRAPHIC AND ACCESS CONTROL SYSTEMS IN ENSURING INFORMATION SECURITY
Keywords:
security, cryptography, confidentiality, integrity, data integrity, DAC, MAC, RBAC, ABAC, identification, authentication, authorization, auditing, LDAP, symmetric key, asymmetric key, digital signatureAbstract
This article examines cryptographic algorithms, access control models, and processes, as well as their interrelationship in ensuring information security. It highlights how these components work together to protect data, manage access, and maintain system integrity in modern information systems.
Downloads
References
Stallings, W. Cryptography and Network Security
Pfleeger, C. P. Security in Computing
NIST SP 800-53 – Security and Privacy Controls for Information Systems
RFC 4949 – Internet Security Glossary
Law of the Republic of Uzbekistan “On Information Security” (2019)
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
All content published in the Journal of Applied Science and Social Science (JASSS) is protected by copyright. Authors retain the copyright to their work, and grant JASSS the right to publish the work under a Creative Commons Attribution License (CC BY). This license allows others to distribute, remix, adapt, and build upon the work, even commercially, as long as they credit the author(s) for the original creation.