Abstract
Access control in Information Technology (IT) systems, also known as Authorization, is one of the cornerstones of any Information Security Policy. The granularity of such access control can be on different levels, for example on volume (disc pack) level, database level, table level, and even on individual record (or tuple) and data field level. Although very fine-grained access control, for example on record level, is often required, in most systems access control on table level is used. The reason is that the management process is significantly easier and simpler the courser the level of control becomes.
MoFAC presents a model in which access control is finer than table level, but where the increase in complexity and management stays within acceptable limits.
Chapter PDF
Similar content being viewed by others
References
Baker, R (1991) Computer Security Handbook, TAB Reference Books.
Bull, JA, Gong, L and Sollins, KR (1992) Towards Security in an Open Systems Foundation, 3–20 in Computer Security—ESORICS 92. Second European Symposium on Research in Computer Security (eds Y Deswarte, G Eizenberg and J-J Quisquater), Springer-Verlag, Amsterdam.
Farrow, R (1991) UNIX System Security, Addison-Wesley.
Holbein, R and Teufel, S (1995) A Context Authentication Service for Role Based Access Control in Distributed Systems, 270–275 in Information Security—the Next Decade (eds JHP Eloff and SH von Solms), Chapman & Hall.
ISSA (1994) Single Sign-On Requirements, Greater New York ISSA Chapter Subcommittee on SSO.
Kay, R, (1994) Distributed and Secure, Byte, 19, 6, 165–180.
Muftic, S (1991) Security Mechanisms for Computer Networks, Ellis Horwood.
Pfleeger, CP (1989) Security in Computing, Prentice-Hall.
Sandhu, RS (1993) Lattice-based Access Control Models, IEEE Computer, 9–19.
UNIX International (1990) UNIX System V Security, UNIX International.
Varadharajan, V (1995) Distributed Object System Security, 305–321 in Information Security—the Next Decade (eds JHP Eloff and SH von Solms), Chapman amp; Hall.
Von Solms, JS, Olivier, MS and Von Solms, SH (1995) Authorization in the Distributed Object Environment MOdel for Fine-grained Access Control (MoFAC), Poster, IT Sicherheit ’85, Graz, Austria.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
von Solms, J.S., Olivier, M.S., von Solms, S.H. (1996). MoFAC: A Model for Fine-grained Access Control. In: Katsikas, S.K., Gritzalis, D. (eds) Information Systems Security. SEC 1996. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-1-5041-2919-0_26
Download citation
DOI: https://doi.org/10.1007/978-1-5041-2919-0_26
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2921-3
Online ISBN: 978-1-5041-2919-0
eBook Packages: Springer Book Archive