2001
DOI: 10.1007/3-540-45608-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Access Control: Policies, Models, and Mechanisms

Abstract: Abstract. Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access control decision is enforced by a mechanism implementing regulations established by a security policy. Different access control policies can be applied, corresponding to different criteria for defining what should, and what should not, be allowed, and, in some sense, to different definitions of what ensuring security means. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
304
0
7

Year Published

2005
2005
2022
2022

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 452 publications
(311 citation statements)
references
References 73 publications
0
304
0
7
Order By: Relevance
“…[15,39,50] are true then L may be true. Essentially, L will be added to the model only if some constraints demand its inclusion.…”
Section: Automated Reasoning In Srementioning
confidence: 99%
“…[15,39,50] are true then L may be true. Essentially, L will be added to the model only if some constraints demand its inclusion.…”
Section: Automated Reasoning In Srementioning
confidence: 99%
“…One salient example is security enforcement, such as access control [48], which can be handled by aspects. In particular, stack-based access control, as provided in Java, requires inspecting the call stack to determine whether a resource can be accessed or not; aspectizing these mechanisms requires pointcuts to access the call context [58].…”
Section: Dealing With Causalitymentioning
confidence: 99%
“…Access control policies can be externalized from the application into a separate artifact that is evaluated by a specialized engine at each access attempt [21]. As opposed to in-code access control, this approach, called policy-based access control, increases modularity, avoids application redeployment when a policy is modified, and provides separation of concerns.…”
Section: Background and Related Workmentioning
confidence: 99%