Preview

Access Control: Policies, Models, and Mechanisms

Powerful Essays
Open Document
Open Document
27400 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control: Policies, Models, and Mechanisms
Access Control: Policies, Models, and
Mechanisms
Pierangela Samarati1 and Sabrina de Capitani di Vimercati2
1

Dipartimento di Tecnologie dell’Informazione, Universit` a di Milano
Via Bramante 65, 26013 Crema (CR), Italy samarati@dsi.unimi.it http://homes.dsi.unimi.it/~samarati
2
Dip. di Elettronica per l’Automazione, Universit` a di Brescia
Via Branze 38, 25123 Brescia, Italy decapita@ing.unibs.it http://www.ing.unibs.it/~decapita

Abstract. Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access control decision is enforced by a mechanism implementing regulations established by a security policy. Different access control policies can be applied, corresponding to different criteria for defining what should, and what should not, be allowed, and, in some sense, to different definitions of what ensuring security means. In this chapter we investigate the basic concepts behind access control design and enforcement, and point out different security requirements that may need to be taken into consideration. We discuss several access control policies, and models formalizing them, that have been proposed in the literature or that are currently under investigation.

1

Introduction

An important requirement of any information management system is to protect data and resources against unauthorized disclosure (secrecy) and unauthorized or improper modifications (integrity), while at the same time ensuring their availability to legitimate users (no denials-of-service). Enforcing protection therefore requires that every access to a system and its resources be controlled and that all and only authorized accesses can take place. This process goes under the name of access control . The development of an access control system requires the definition of the regulations according to which access is to be controlled and their



References: 15:706–734, 1993. 173, 174 2 4. A. Aho, J. Hoperoft, and J. Ullman. The Design and Analysis of Computer Algorithms. Addison-Wesley, 1974. 143 5 Kluwer Academic Publishers, 1999. 161 8 Technical Report ESD-TR-278, vol. 3, The Mitre Corp., Bedford, MA, 1973. 152, 153 Bedford, MA, 1973. 152 12 14. E. Bertino, S. de Capitani di Vimercati, E. Ferrari, and P. Samarati. Exceptionbased information flow control in object-oriented systems. ACM Transactions on Information and System Security (TISSEC), 1(1):26–65, 1998 Issues in Distributed and Mobile Object Systems. Springer Verlag – LNCS Stateof-the-Art series, 1998. 189 18 Gaithersburg, MD, 1985. 164 20 to composing access control policies. In Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, 2000 22. D. F. C. Brewer and M. J. Nash. The Chinese Wall security policy. In Proc. IEEE Symposium on Security and Privacy, pages 215–228, Oakland, CA, 1989 Addison-Wesley, 1995. 178 Access Control: Policies, Models, and Mechanisms Trust management for Web applications. Computer Networks and ISDN Systems, 29(8–13):953–964, 1997 Standard, ISo/IEC 9075:1999, 1999. 177, 180, 181 29 (PODS), Philadelphia, CA, 1999. 156, 159 31

You May Also Find These Documents Helpful

  • Good Essays

    Designing a fault-tolerant system can be done at different levels of the software stack. We call general purpose the approaches that detect and correct the failures at a given level of that stack, masking them entirely to the higher levels (and ultimately to the end-user, who eventually see a correct result, despite the occurrence of failures). General-purpose approaches can target specific types of failures (e.g. message loss, or message corruption), and let other types of failures hit higher levels of the software stack. In this section, we discuss a set of well-known and recently developed protocols to provide general-purpose fault tolerance for a large set of failure types, at different levels of the software stack, but always below the…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    IS3230 Final Exam Answers

    • 939 Words
    • 4 Pages

    6. Which of the following should be considered while implementing a layered access security approach?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    International Relations

    • 2065 Words
    • 9 Pages

    Security can be defined as the ability to thwart internal and external threats of a nation (Lawson, 2003: 78). As a concept however this is a very broad term and within its broad term lies why it has become a contested concept even in this post-cold war era. The IR theories – especially the Realist and liberalist theories – shall be used in the following essay in unearthing the real issues behind security and why it remains the talk of this new era.…

    • 2065 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    References: techNet. (2005, January 21). Access control in Active Directory. Retrieved from Microsoft TechNet: http://technet.microsoft.com/en-us/library/cc785913(v=ws.10).aspx…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Write a 1,050- to 1,400-word paper using the same step of the accounting cycle your Learning Team selected for its Accounting Cycle Description Paper that examines the hardware and software necessary to integrate this accounting process into an automated system.…

    • 127 Words
    • 1 Page
    Satisfactory Essays

Related Topics