@article{(Open Science Index):https://publications.waset.org/pdf/10007355, title = {BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System}, author = {Gang Liu and Can Wang and Runnan Zhang and Quan Wang and Huimin Song and Shaomin Ji}, country = {}, institution = {}, abstract = {Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.}, journal = {International Journal of Computer and Information Engineering}, volume = {11}, number = {6}, year = {2017}, pages = {765 - 771}, ee = {https://publications.waset.org/pdf/10007355}, url = {https://publications.waset.org/vol/126}, bibsource = {https://publications.waset.org/}, issn = {eISSN: 1307-6892}, publisher = {World Academy of Science, Engineering and Technology}, index = {Open Science Index 126, 2017}, }