Skip to main content
  • 280 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Bell, D.E. and L.J. LaPadula (1973). “Secure computer systems: A mathematical model.” Mitre Technical Report 2547, vol. II.

    Google Scholar 

  2. Biba, K.J. (1977). “Integrity considerations for secure computer systems.” Mitre Technical Report 3153.

    Google Scholar 

  3. Brewer, D. and M. Nash (1989). “The chinese wall security policy.” Proc. IEEE Symposium on Security and Privacy, 206–214.

    Google Scholar 

  4. Clark, D.D. and D.R. Wilson (1987). “A comparison of commercial and military computer securit policies.” Proc. IEEE Symposium on Security and Privacy, 184–194.

    Google Scholar 

  5. Denning, D.E. (1976). “A lattice model of secure information flow.” Communications of the ACM, 19 (5), 236–243.

    Article  MATH  MathSciNet  Google Scholar 

  6. Dennis, J.B. and E.C. Van Horn (1966). “Programming semantics for multiprogrammed computations.” Communications of the ACM, 9 (3), 143–155.

    Article  MATH  Google Scholar 

  7. Ellison, C.M., B. Frantz, B. Lampson, R. Rivest, B.M. Thomas, and T. Ylönen (1999). SPKI Certificate Theory, RFC 2693.

    Google Scholar 

  8. Fabry, R.S. (1974). “Capability-based addressing.” Communications of the ACM, 17 (7), 403–412.

    Article  Google Scholar 

  9. Fagin, R. (1978). “On an authorization mechanism.” ACM Transactions on Database Systems, 3 (3), 310–319.

    Article  Google Scholar 

  10. Griffiths, P.P. and B.W. Wade (1976). “An authorization mechanism for a relational database system.” ACM Transactions on Database Systems, 1 (3), 242–255.

    Article  Google Scholar 

  11. Harrison, M., W. Ruzzo, and J. Ullman (1976). “Protection in operating systems.” Communications of the ACM, 19 (8), 461–471.

    Article  MATH  MathSciNet  Google Scholar 

  12. Lampson, B.W. (1974). “Protection.” ACM Operating Systems Rev., 8 (1), 18–24.

    Article  Google Scholar 

  13. Lampson, B.W., M. Abadi, M. Burrows, and E. Wobber (1992). “Authentication in distributed systems: Theory and practice.” ACM Transactions on Computer Systems, 10 (4), 265–310.

    Article  Google Scholar 

  14. Landwehr, C.E. (1981). “Formal models for computer security.” ACM Computing Surveys, 13 (3), 247–278.

    Article  Google Scholar 

  15. Levy, H.M. (1984). Capability-Based Computer Systems. Butterworth-Heinemann, Newton, MA.

    Google Scholar 

  16. Linden, T.A. (1976). “Operating system structures to support security and reliable software.” ACM Computing Surveys, 8 (4), 409–445.

    Article  Google Scholar 

  17. Saltzer, J.H. and M.D. Schroeder (1975). “The protection of information in computer systems.” Proc. of the IEEE, 9 (63), 1278–1308.

    Article  Google Scholar 

  18. Sandhu, R.S. (1993). “Lattice-based access control models.” IEEE Computer, 26 (11), 9-19.

    Google Scholar 

  19. Sandhu, R.S., E.J. Coyne, H.L. Feinstein, and C.E. Youman (1996). “Role-based access control models.” IEEE Computer, 29 (2), 38–47.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Brose, G. (2005). Access Control. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_3

Download citation

Publish with us

Policies and ethics