@article{(Open Science Index):https://publications.waset.org/pdf/10007355,
	  title     = {BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System},
	  author    = {Gang Liu and  Can Wang and  Runnan Zhang and  Quan Wang and  Huimin Song and  Shaomin Ji},
	  country	= {},
	  institution	= {},
	  abstract     = {Biba model can protect information integrity but might
deny various non-malicious access requests of the subjects, thereby
decreasing the availability in the system. Therefore, a mechanism that
allows exceptional access control is needed. Break the Glass (BTG)
strategies refer an efficient means for extending the access rights of
users in exceptional cases. These strategies help to prevent a system
from stagnation. An approach is presented in this work for integrating
Break the Glass strategies into the Biba model. This research proposes
a model, BTG-Biba, which provides both an original Biba model used
in normal situations and a mechanism used in emergency situations.
The proposed model is context aware, can implement a fine-grained
type of access control and primarily solves cross-domain access
problems. Finally, the flexibility and availability improvement with
the use of the proposed model is illustrated.},
	    journal   = {International Journal of Computer and Information Engineering},
	  volume    = {11},
	  number    = {6},
	  year      = {2017},
	  pages     = {765 - 771},
	  ee        = {https://publications.waset.org/pdf/10007355},
	  url   	= {https://publications.waset.org/vol/126},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 126, 2017},