0% found this document useful (0 votes)
5 views13 pages

CH 04

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views13 pages

CH 04

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Computer Security:

Principles and Practice


Chapter 4 – Access Control

First Edition
by William Stallings and Lawrie Brown

Lecture slides by Lawrie Brown


Access Control
 “The prevention of unauthorized use of a
resource, including the prevention of use
of a resource in an unauthorized manner“
 central element of computer security
 assume have users and groups
 authenticate to system
 assigned access rights to certain resources
on system
Access Control Principles
Access Control Policies
Access Control Requirements
 reliable input
 fine and coarse specifications
 least privilege
 separation of duty
 open and closed policies
 policy combinations, conflict resolution
 administrative policies
Access Control Elements
 subject - entity that can access objects
 a process representing user/application
 often have 3 classes: owner, group, world
 object - access controlled resource
 e.g. files, directories, records, programs etc
 number/type depend on environment
 access
right - way in which subject
accesses an object
 e.g. read, write, execute, delete, create, search
Discretionary Access Control
 often provided using an access matrix
 lists subjects in one dimension (rows)
 lists objects in the other dimension (columns)
 each entry specifies access rights of the
specified subject to that object
 access matrix is often sparse
 can decompose by either row or column
Access Control Model
Protection Domains
 set of objects with associated access rights
 in access matrix view, each row defines a
protection domain
 but not necessarily just a user
 may be a limited subset of user’s rights
 applied to a more restricted process
 may be static or dynamic
Role-
Based
Access
Control
Role-
Based
Access
Control
NIST RBAC Model
Summary
 introduced access control principles
 subjects, objects, access rights
 discretionary access controls
 access matrix, access control lists (ACLs),
capability tickets
 UNIX traditional and ACL mechanisms
 role-based access control

You might also like