INTEGRATION OF CRYPTOGRAPHIC AND ACCESS CONTROL SYSTEMS IN ENSURING INFORMATION SECURITY

Authors

  • G’ulomova Ko’hinur Murod qizi, Ko’chimova Oyshabonu O’tkirjon qizi, Usmonov Faxriddin Sharofiddin o’g’li, Muhammatjonov Muxammadqodir Rashidbek o'g'li Tashkent University of Information Technologies named after Muhammad al-Khwarizmi

Keywords:

security, cryptography, confidentiality, integrity, data integrity, DAC, MAC, RBAC, ABAC, identification, authentication, authorization, auditing, LDAP, symmetric key, asymmetric key, digital signature

Abstract

This article examines cryptographic algorithms, access control models, and processes, as well as their interrelationship in ensuring information security. It highlights how these components work together to protect data, manage access, and maintain system integrity in modern information systems.

Downloads

Download data is not yet available.

References

Stallings, W. Cryptography and Network Security

Pfleeger, C. P. Security in Computing

NIST SP 800-53 – Security and Privacy Controls for Information Systems

RFC 4949 – Internet Security Glossary

Law of the Republic of Uzbekistan “On Information Security” (2019)

Downloads

Published

2026-04-06

How to Cite

G’ulomova Ko’hinur Murod qizi, Ko’chimova Oyshabonu O’tkirjon qizi, Usmonov Faxriddin Sharofiddin o’g’li, Muhammatjonov Muxammadqodir Rashidbek o'g'li. (2026). INTEGRATION OF CRYPTOGRAPHIC AND ACCESS CONTROL SYSTEMS IN ENSURING INFORMATION SECURITY . Journal of Applied Science and Social Science, 16(4), 228–234. Retrieved from https://www.internationaljournal.co.in/index.php/jasass/article/view/3955