Advances, Systems and Applications
Author (year)/Criteria | Access Control | Authorization | Authentication | Trust Worthiness | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|---|---|
J. Schiffman (2010) [24] | Yes | Yes | Yes | Yes | Yes | ||
Z. Mahmood (2011) [23] | Yes | Yes | Yes | Yes | |||
Sun, Y (2014) [25] | Yes | Yes | Yes | Yes | Yes | ||
Jakimoski, K. (2016) [26] | Yes | Yes | Yes | ||||
Ning, J. (2017) [27] | Yes | Yes | Yes | ||||
Roy, S. (2018) [28] | Yes | Yes | Yes | Yes | |||
Yang, C. (2020) [29] | Yes | Yes | Yes | Yes | Yes | ||
Suresha, K. (2021) [30] | Yes | Yes | Yes | Yes | |||
Ahmadi, S (2022) [31] | Yes | Yes | Yes | Yes | |||
Qiwen Li, (2023) [32] | Yes | Yes | Yes | Yes | |||
Total | 6 | 6 | 7 | 5 | 5 | 8 | 4 |