Abstract
Access control is a process to determine “Who does what to what,” based on a policy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Panko RR (2004) Corporate computer and network security. Prentice-Hall, Upper Saddle River
Gollman D (2000) Computer security. Wiley, New York
An Introduction to Role-based Access Control. NIST/ITL Bulletin, December, 1995. http://csrc.nist.gov/rbac/NIST-ITL-RBAC-bulletin.html
Differentiating Between Access Control Terms. http://secinf.net/uplarticle/2/Access_Control_WP.pdf
Byers S, Freire J, Silva C. Efficient acquisition of web data through restricted query interfaces. AT&T Labs-Research. http://www10.org/cdrom/posters/p1051/
Bannan K. Watching you, watching me PCs are turning informant. Whose side are they on? PC Magazine, July 1, 2002, http://www.pcmag.com/article2/0,4149,342208,00.asp
NASA World Wide Web Best Practices (2000–2001) Draft version 2.0. http://nasa-wbp.larc.nasa.gov/devel/4.0/4_4.html
Pipkin D (2000) Information security: protecting the global enterprise. Prentice-Hall, Upper Saddle River
Kahan J. A distributed authorization model for WWW. May, 1995. http://www.isoc.org/HMP/PAPER/107/html/paper.html. Accessed on 5/6/2003
NASA. World wide web best practices 2000–2001 draft version 2.0. 8/20/2000. http://nasa-wbp.larc.nasa.gov/devel/4.0/4_4.html. 5/6/2003
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Kizza, J.M. (2017). Access Control and Authorization. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-55606-2_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55605-5
Online ISBN: 978-3-319-55606-2
eBook Packages: Computer ScienceComputer Science (R0)