Skip to main content

Access Control from an OS Security Perspective

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 1032 Accesses

Synonyms

Access control

Related Concepts

Access Control Lists; Access Control Matrix; Authentication; Authorization; Capability List; Confidentiality; Identification; Integrity; Secrecy

Definition

Access control for an operating system determines how the operating system implements accesses to system resources by satisfying the security objectives of integrity, availability, and secrecy. Such a mechanism authorizes subjects (e.g., processes and users) to perform certain operations (e.g., read, write) on objects and resources of the OS (e.g., files, sockets).

Background

Operating system is the main software between the users and the computing system resources that manage tasks and programs. Resources may include files, sockets, CPU, memory, disks, timers, network, etc. System administrators, developers, regular users, guests, and even hackers could be the users of the computing system. Information security is an important issue for an operating system due to its...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Jaeger T (2008) Operating system security, Synthesis lectures on information security, privacy, and trust. Morgan & Claypool Publishers, 1(1):1–218, doi:10.2200/S00126ED1V01Y200808SPT001

    MathSciNet  Google Scholar 

  2. Stamp M (2006) Information security: principles and practice. Wiley, Hoboken

    Google Scholar 

  3. Palmer M, Walters M (2006) Guide to operating systems: enhanced edition. Thomson Course Technology, Boston

    Google Scholar 

  4. Sandbu RS (1997) Role-based access control. ACM, New York, pp 23–30

    Google Scholar 

  5. Yi XJ, Yin H, XiTao Z (2004) Security analysis of mandatory access control model. In: Proceedings of the 2004 IEEE international conference on systems, man and cybernetics. IEEE, Piscataway, pp 5013–5018

    Google Scholar 

  6. Li N (2008) How to make discretionary access control secure against trojan horses. In: Proceedings of the IEEE international symposium on parallel and distributed processing, IEEE, Piscataway, pp 1–3

    Google Scholar 

  7. Liu S, Huang H (2009) Role-based access control for distributed cooperation environment. In: International conference on computational intelligence and security, CIS ’09, vol 2. IEEE, Los Alamitos, pp 455–459

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Cankaya, H.C. (2011). Access Control from an OS Security Perspective. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_769

Download citation

Publish with us

Policies and ethics