Skip to main content

Abstract

Access control is the process of controlling every request to a system and determining, based on specified rules (authorizations), whether the request should be granted or denied. The definition of an access control system is typically based on three concepts: access control policies, access control models, and access control mechanisms. In this chapter, we focus on the traditional access control models and policies. In particular, we review two of the most important policies: the discretionary and mandatory access control policies. We therefore start the chapter with an overview of the basic concepts on which access control systems are based. We then illustrate different traditional discretionary and mandatory access control policies and models that have been proposed in the literature, also investigating their low-level implementation in terms of security mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. Samarati, S. De Capitani di Vimercati (2001). Access control: Policies, models, and mechanisms. In: R. Focardi, R. Gorrieri (eds.), Foundations of Security Analysis and Design. Springer-Verlag, New York.

    Google Scholar 

  2. R. Focardi, R. Gorrieri (1997). The compositional security checker: A tool for the verification of information flow security properties. IEEE Transaction Software Engineering, 23(9):550–571.

    Article  Google Scholar 

  3. G.S. Graham, P.J. Denning (1972). Protection-principles and practice. In AFIPS Proc. of the Spring Jt. Computer Conference, Montvale, NJ, USA.

    Google Scholar 

  4. H.H. Harrison, W.L. Ruzzo, J.D. Ullman (1976). Protection in operating systems. Communications of the SCM, 19(8):461–471.

    Article  MATH  MathSciNet  Google Scholar 

  5. B.W. Lampson (1974). Protection. ACM Operating Systems Review, 8(1):18–24.

    Article  Google Scholar 

  6. S. Jajodia, P. Samarati, M.L. Sapin, V.S. Subrahmanian (2001). Flexible support for multiple access control policies. ACM Transaction on Database Systems, 26(2):214–260.

    Article  Google Scholar 

  7. T.F. Lunt (1988). Access control policies: Some unanswered questions. In Proc. of IEEE Computer Security Foundations Workshop II, Franconia, New Hampshire.

    Google Scholar 

  8. R.S. Sandhu (1993). Lattice-based access control models. IEEE Computer, 26(11):9–19.

    Google Scholar 

  9. D. Bell and L. LaPadula (1973). Secure computer systems: A mathematical model. Technical Report MTR-2547, Vol. 2, MITRE Corp., Bedford, MA.

    Google Scholar 

  10. D. Bell and L. LaPadula (1973). Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA.

    Google Scholar 

  11. D. Bell and L. LaPadula (1974). Secure computer systems: A refinement of the mathematical model. Technical Report MTR-2547, Vol. 3, MITRE Corp., Bedford, MA.

    Google Scholar 

  12. Bell D and LaPadula L (1975). Secure computer systems: Unified exposition and multics interpretation. Technical Report MTR-2997, Vol. 4, MITRE Corp., Bedford, MA.

    Google Scholar 

  13. K.J. Biba (1977). Integrity considerations for secure computer systems. Technical Report MTR-3153, rev., MITRE Corp., Vol. 1, Bedford, MA.

    Google Scholar 

  14. J.C. Wray (1991). An analysis of covert timing channels. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA.

    Google Scholar 

  15. J. McLean (1994). Security models. In: Marciniak J (ed.), Encyclopedia of Software Engineering. John Wiley & Sons.

    Google Scholar 

  16. J.A. Goguen, J. Meseguer (1984). Unwinding and inference control. In IEEE Symposium on Security and Privacy, Los Angeles, CA, USA.

    Google Scholar 

  17. S. Jajodia, R. Sandhu (1991). Toward a multilevel secure relational data model. In Proc. of the ACM SIGMOD Conference on Management of Data, Denver, CO, USA.

    Google Scholar 

  18. T.F. Lunt (1991). Polyinstantiation: An inevitable part of a multilevel world. In Proc. of the IEEE Workshop on Computer Security Foundations, Franconia, New Hampshire.

    Google Scholar 

  19. T.F. Lunt, D.E. Denning, R.P. Schell, M. Heckman, W.R. Shockley (1990). The seaview security model. IEEE Transaction on Software Engineering, 16(6):593–607.

    Article  Google Scholar 

  20. R.S. Sandhu, S. Jajodia (1992). Polyinstantiation for cover stories. In Proc. 2nd European Symposium on Research in Computer Security — ESORICS’ 92, Toulouse, France.

    Google Scholar 

  21. P.P. Griffiths, B.W. Wade (1976). An authorization mechanism for a relational database system. ACM Transactions on Database Systems, 1(3):242–255.

    Article  Google Scholar 

  22. Database language SQL-part 2: Foundation (SQL/foundation) (1999). ISO International Standard, ISO/IEC 9075:1999.

    Google Scholar 

  23. E. Bertino, P. Samarati, S. Jajodia (1997). An extended authorization model for relational databases. IEEE-TKDE, 9(1):85–101.

    Google Scholar 

  24. P. Bonatti, S. De Capitani di Vimercati, P. Samarati (2002). An algebra for composing access control policies. ACM Transactions on Information and System Security, 5(1):1–35.

    Article  Google Scholar 

  25. L. Wang, D. Wijesekera, S. Jajodia (2004). A logic-based framework for attribute based access control. In Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA.

    Google Scholar 

  26. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati (2002). A fine-grained access control system for XML documents. ACM Transactions on Information and System Security, 5(2):169–202.

    Article  Google Scholar 

  27. S. Godik, T. Moses (2003). eXtensible Access Control Markup Language (XACML) version 1.1. http://www.oasis-open.org/committees/xacml/repository/cs-xacml-specification-1.1.pdf.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

De Capitani di Vimercati, S., Foresti, S., Samarati, P. (2007). Authorization and Access Control. In: Petković, M., Jonker, W. (eds) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69861-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69861-6_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69860-9

  • Online ISBN: 978-3-540-69861-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics