Skip to main content

Access Control and Authorization

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 192k Accesses

Abstract

Access control is a process to determine “Who does what to what,” based on a policy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Panko RR (2004) Corporate computer and network security. Prentice-Hall, Upper Saddle River

    Google Scholar 

  2. Gollman D (2000) Computer security. Wiley, New York

    Google Scholar 

  3. An Introduction to Role-based Access Control. NIST/ITL Bulletin, December, 1995. http://csrc.nist.gov/rbac/NIST-ITL-RBAC-bulletin.html

  4. Differentiating Between Access Control Terms. http://secinf.net/uplarticle/2/Access_Control_WP.pdf

  5. Byers S, Freire J, Silva C. Efficient acquisition of web data through restricted query interfaces. AT&T Labs-Research. http://www10.org/cdrom/posters/p1051/

  6. Bannan K. Watching you, watching me PCs are turning informant. Whose side are they on? PC Magazine, July 1, 2002, http://www.pcmag.com/article2/0,4149,342208,00.asp

  7. Iris scan. http://ctl.ncsc.dni.us/biomet%20web/BMIris.html

  8. NASA World Wide Web Best Practices (2000–2001) Draft version 2.0. http://nasa-wbp.larc.nasa.gov/devel/4.0/4_4.html

  9. Pipkin D (2000) Information security: protecting the global enterprise. Prentice-Hall, Upper Saddle River

    Google Scholar 

  10. Kahan J. A distributed authorization model for WWW. May, 1995. http://www.isoc.org/HMP/PAPER/107/html/paper.html. Accessed on 5/6/2003

  11. NASA. World wide web best practices 2000–2001 draft version 2.0. 8/20/2000. http://nasa-wbp.larc.nasa.gov/devel/4.0/4_4.html. 5/6/2003

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Kizza, J.M. (2017). Access Control and Authorization. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55606-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-55605-5

  • Online ISBN: 978-3-319-55606-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics