000000016 001__ 16
000000016 005__ 20130522141956.0
000000016 037__ $$aLERSSE-PRESENTATION-2005-007
000000016 041__ $$aeng
000000016 100__ $$aKonstantin Beznosov
000000016 245__ $$aAccess Control 
000000016 260__ $$c2005-10-16
000000016 520__ $$aLearning objectives:  Comprehend the principles behind access control mechanisms used in today\\\\\\\'s:  * operating systems, * middleware, * virtual machines. Overview: In this module, the principles behind access control mechanisms and policies employed in todays operating systems, middleware, and virtual machines are studied. Two key principles are at the basis of all protection mechanisms:  * the Trusted Computing Base (TCB) * the Reference Monitor. Generic representations of access control policies follow: * Lampson Access Matrix, and its optimized forms, * Access Control Lists (ACLs) * Capabilities. The focus shifts to the main types of access control policies: * owner-based Discretionary Access Control (DAC), * lattice-based Mandatory Access Control (MAC), * Chinese Wall model, * Clark-Wilson model, and * role-based access control (RBAC).
000000016 6531_ $$aaccess control 
000000016 8560_ $$fqiangw@ece.ubc.ca
000000016 8564_ $$uhttp://lersse-dl.ece.ubc.ca/record/16/files/16.pdf$$yTransfer from CDS 0.99.7
000000016 909C4 $$pKonstantin Beznosov, "Access Control," lecture given at the	secure application development course SecAppDev course, Brussels, Belgium,	Katholieke Universiteit Leuven, 28 February, 2005, pp.46. 
000000016 980__ $$aPRESENTATION