Identity Management

  • Izzat Alsmadi


Access controls are considered as important security mechanisms. They usually target (authenticated users: Those users who can legally access subject information system or resource). This indicates that they typically come after an initial stage called (authentication). In authentication, the main goal is to decide whether a subject user, traffic, or request can be authenticated to access the information resource or not. As such authentication security control decision or output is a binary of either, yes (authenticated; pass-in), or no (unauthenticated; block). Access control or authorization is then considered the second stage in this layered security control mechanism. For example, it is important to decide whether subject user has a view/read, modify, execute, etc. type of permission or privilege on subject information resource. In this chapter, we will cover issues related to access controls in operating systems, databases, websites, etc.


  1. Alsmadi I, Xu D (2015) Security of software defined networks: a survey. Comput Secur 53:79–108CrossRefGoogle Scholar
  2. Cisco Knowledge Base (2018) Configuration of MAC based access control lists on ESW500 series switches. Article ID: 503. Cisco.
  3. Domingo-Ferrer J (2009) Inference control in statistical databases. In: Encyclopedia of database systems. Springer, New York, pp 1472–1476Google Scholar
  4. Ghiglieri M (2017) Smart TV privacy risks and protection measures. Ph.D. Thesis, Technische Universität, DarmstadtGoogle Scholar
  5. NIST 2010. A report on: 2010 economic analysis of role-based access control.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Izzat Alsmadi
    • 1
  1. 1.Texas A&M UniversitySan AntonioUSA

Personalised recommendations