Access Control

Access Control - Computer Security Access Control 1...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
11/07/11 1 Computer Security Access Control
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/07/11 2 The Orange Book First published in 1983, the Department of Defense Trusted Computer System Evaluation Criteria , known as the Orange Book is the de facto standard for computer security today. The Orange Book , and others in the R a i n b o w Series, are still the benchmark for systems produced almost two decades later, and Orange Book classifications such as C2 provide a shorthand for the base level security features of modern operating systems .
Background image of page 2
11/07/11 3 Access Control Terminology subject, object, reference monitor access request Subject Access request Reference monitor Object
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/07/11 4 Access Control Terminology Authentication of statement s : . . answers the question: who said s ? Authorization of object o : .. answers the question: “ who is trusted to access o ? Subject s Access request Reference monitor Object o
Background image of page 4
11/07/11 5 Access Control We can specify What a subject is allowed to do Way may be done with an object
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/07/11 6 Access Control Who is a subject ? A principal , a user identity We might say that a subject `speaks for’ a principal
Background image of page 6
11/07/11 7 Access Operations Access modes Observe look at the contents of an object Alter change the contents of an object
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/07/11 8 Access Operations Bell-LaPadula security model observe alter Access rights execute append read write x x x x
Background image of page 8
11/07/11 9 Access Operations Unix read        read from a file list directory contents write       write to a file create or rename a file in a directory execute   execute a (program) file search the directory
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/07/2011 for the course CIS 4360 taught by Professor Mikeburmester during the Fall '11 term at FSU.

Page1 / 33

Access Control - Computer Security Access Control 1...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online