Synonyms
Related Concepts
Definition
Access control for an operating system determines how the operating system implements accesses to system resources by satisfying the security objectives of integrity, availability, and secrecy. Such a mechanism authorizes subjects (e.g., processes and users) to perform certain operations (e.g., read, write) on objects and resources of the OS (e.g., files, sockets).
Background
Operating system is the main software between the users and the computing system resources that manage tasks and programs. Resources may include files, sockets, CPU, memory, disks, timers, network, etc. System administrators, developers, regular users, guests, and even hackers could be the users of the computing system. Information security is an important issue for an operating system due to its...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Jaeger T (2008) Operating system security, Synthesis lectures on information security, privacy, and trust. Morgan & Claypool Publishers, 1(1):1–218, doi:10.2200/S00126ED1V01Y200808SPT001
Stamp M (2006) Information security: principles and practice. Wiley, Hoboken
Palmer M, Walters M (2006) Guide to operating systems: enhanced edition. Thomson Course Technology, Boston
Sandbu RS (1997) Role-based access control. ACM, New York, pp 23–30
Yi XJ, Yin H, XiTao Z (2004) Security analysis of mandatory access control model. In: Proceedings of the 2004 IEEE international conference on systems, man and cybernetics. IEEE, Piscataway, pp 5013–5018
Li N (2008) How to make discretionary access control secure against trojan horses. In: Proceedings of the IEEE international symposium on parallel and distributed processing, IEEE, Piscataway, pp 1–3
Liu S, Huang H (2009) Role-based access control for distributed cooperation environment. In: International conference on computational intelligence and security, CIS ’09, vol 2. IEEE, Los Alamitos, pp 455–459
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Cankaya, H.C. (2011). Access Control from an OS Security Perspective. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_769
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_769
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering