Which security mechanism is used to determine the accessibility of objects to certain subjects?

Access Control from an OS Security Perspective; Confidentiality; Discretionary Access Control; Firewall; Integrity; Mandatory Access Control; Role Based Access Control

Definition

Access control is a security function that protects shared resources against unauthorized accesses. The distinction between authorized and unauthorized accesses is made according to an access control policy.

Theory

Access control is employed to enforce security requirements such as confidentiality and integrity of data resources (e.g., files, database tables) to prevent unauthorized use of resources (e.g., programs, processor time, expensive devices), or to prevent denial of serviceto legitimate users. Practical examples of security violations that can be prevented by enforcing access control policies are: a journalist reading a politician’s medical record (confidentiality), a criminal performing fake bank account bookings (integrity), a student printing...

This is a preview of subscription content, access via your institution.

Buying options

Chapter

EUR   29.95

Price includes VAT (Australia)
  • DOI: 10.1007/978-1-4419-5906-5_179
  • Chapter length: 6 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Buy Chapter

eBookEUR   748.99Price includes VAT (Australia)

  • ISBN: 978-1-4419-5906-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Buy eBook

Hardcover BookEUR   799.99Price excludes VAT (Australia)

  • ISBN: 978-1-4419-5905-8
  • Dispatched in 3 to 5 business days
  • Exclusive offer for individuals only
  • Free shipping worldwide
    Shipping restrictions may apply, check to see if you are impacted.
  • Tax calculation will be finalised during checkout
Buy Hardcover Book

Learn about institutional subscriptions

Access Control. Fig. 1

Which security mechanism is used to determine the accessibility of objects to certain subjects?

Which security mechanism is used to determine the accessibility of objects to certain subjects?

Access Control. Fig. 2

Which security mechanism is used to determine the accessibility of objects to certain subjects?

Which security mechanism is used to determine the accessibility of objects to certain subjects?

Access Control. Fig. 3

Which security mechanism is used to determine the accessibility of objects to certain subjects?

Which security mechanism is used to determine the accessibility of objects to certain subjects?

  1. Saltzer JH, Schroeder MD (September 1975) The protection of information in computer systems. Proceedings of the IEEE 9(63):1278–1308

    CrossRef  Google Scholar 

  2. Clark DD, Wilson DR (1987) A comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy, pp 184–194

    Google Scholar 

  3. Brewer D, Nash M (1989) The Chinese wall security policy. In Proceedings of the IEEE Symposium on Security and Privacy, pp 206–214

    Google Scholar 

  4. Landwehr CE (September 1981) Formal models for computer security. ACM Comput Surv 13(3):247–278

    CrossRef  Google Scholar 

  5. Lampson BW (January 1974) Protection. ACM Operating Syst Rev 8(1):18–24

    CrossRef  Google Scholar 

  6. Harrison MH, Ruzzo WL, Ullman JD (1976) Protection in operating systems. Commun ACM 19(8):461–471

    CrossRef  MATH  MathSciNet  Google Scholar 

  7. Griffiths PP, Wade BW (September 1976) An authorization mechanism for a relational database system. ACM Trans Database Syst 1(3):242–255

    CrossRef  Google Scholar 

  8. Fagin R (September 1978) On an authorization mechanism. ACM Trans Database Syst 3(3):310–319

    CrossRef  Google Scholar 

  9. Lampson BW, Abadi M, Burrows M, Wobber E (November 1992) Authentication in distributed systems: theory and practice. ACM Trans Comput Syst 10(4):265–310

    CrossRef  Google Scholar 

  10. Dennis JB, Van Horn EC (March 1966) Programming semantics for multiprogrammed computations. Commun ACM 9(3): 143–155

    CrossRef  MATH  Google Scholar 

  11. Fabry RS (1974) Capability-based addressing. Commum ACM 17(7):403–412

    CrossRef  Google Scholar 

  12. Linden TA (December 1976) Operating system structures to support security and reliable software. ACM Comput Surv 8(4):409–445

    CrossRef  Google Scholar 

  13. Levy HM (1984) Capability-based computer systems. Digital Press, Maynard

    Google Scholar 

  14. Ellison CM, Frantz B, Lampson B, Rivest R, Thomas BM, Ylönen T (September 1999) SPKI certificate theory. RFC 2693

    Google Scholar 

  15. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (February 1996) Role-based access control models. IEEE Comput 29(2): 38–47

    CrossRef  Google Scholar 

  16. Sandhu RS (November 1993) Lattice-based access control models. IEEE Comput 26(11):9–19

    CrossRef  Google Scholar 

  17. Bell DE, LaPadula LJ (May 1973) Secure computer systems: a mathematical model. Mitre Technical Report 2547, Volume II

    Google Scholar 

  18. Biba KJ (1977) Integrity considerations for secure computer systems. Mitre Technical Report 3153

    Google Scholar 

  19. Denning DE (1976) A lattice model of secure information flow. Commun ACM 19(5):236–243

    CrossRef  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. HYPE Softwaretechnik GmbH, Trierer Straße 70-72, D-53115, Bonn, Germany

    Gerald Brose

Authors

  1. Gerald Brose

    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Mathematics and Computing Science, Eindhoven University of Technology, 5600 MB, Eindhoven, The Netherlands

    Henk C. A. van Tilborg

  2. Center for Secure Information Systems, George Mason University, Fairfax, VA, 22030-4422, USA

    Sushil Jajodia

Rights and permissions

Reprints and Permissions

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Brose, G. (2011). Access Control. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_179

In which type of access control system would access to data be determined by a subject clearance?

Mandatory Access Control (MAC) is system-enforced access control based on a subject's clearance and an object's labels.

What are the 4 types of access control?

Access Control: Models and Methods.
This response leads to more frustration as the user needs to get on with their task and all they need is access to one folder. ... .
Mandatory Access Control (MAC).
Role-Based Access Control (RBAC).
Discretionary Access Control (DAC).
Rule-Based Access Control (RBAC or RB-RBAC).

What are the 3 types of access control?

Three main types of access control systems are: Discretionary Access Control (DAC), Role Based Access Control (RBAC), and Mandatory Access Control (MAC). DAC is a type of access control system that assigns access rights based on rules specified by users.

What is access control mechanism in information security?

Access control identifies users by verifying various login credentials, which can include usernames and passwords, PINs, biometric scans, and security tokens. Many access control systems also include multifactor authentication (MFA), a method that requires multiple authentication methods to verify a user's identity.