skip to main content
10.1145/1734714.1734734acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article
Free access

A model for access control

Published: 11 November 1971 Publication History

Abstract

The problems of authorization for a multiple-user resource sharing data processing system are discussed. The requirements for access of objects to other objects are covered in some detail. A model is then developed in which the above requirements are contained, in order to devise a conceptual framework for actual design of an access control system.

References

[1]
Ellis, William B., Security Procedures for the RYE System, NSA: C924, Dec 23, 1968.
[2]
Defense Intelligence Agency, Security of Classified Information in the DIA ANSRS System, DIA: C-3663/MS5, Feb 14, 1969.
[3]
Schroeder, M. D. and Saltzer, J. H., A Hardware Architecture for Implementing Protection Rings, Proceedings of the 4rd ACM Symposium on Operating Systems Principles, October 1971.
[4]
Friedman, T. D., The Authorization Problem in Shared Files, IBM Systems Journal, No. 4, 1970.
[5]
Bingham, H. W., Security Techniques for EDP of Multilevel Classified Information, Rome Air Development Command TR-65-415, Dec 1965.
[6]
Graham, Robert M., Protection in an Information Processing Utility, CACM, Vol 11, #5, May 1968, p. 368.
[7]
Hoffman, Lance J., The Formulary Model for Access Control and Privacy, Stanford Linear Accelerator Center (SLAC) Report #117, May 1970.
[8]
Weissman, Clark, Security Controls in the ADEPT-50 Time-sharing System, Proceedings, 1969 Fall Joint Computer Conference, Vol 35, p. 119.
[9]
Denning, Peter J., et al., An Undergraduate Course on Operating Systems Principles, An Interim Report of the COSINE Committee of the Commission On Education of the National Academy of Engineering, June 1971.
[10]
Lampson, B. W., Dynamic Protection Structures, Proceedings, 1969 Fall Joint Computer Conference, p. 27.
[11]
GUIDE Inc., Data Base Management System Requirements, Joint Guide-Share Data Base Requirements Group, Nov 11, 1970.

Cited By

View all
  • (1974)Access control in a relational data base management system by query modificationProceedings of the 1974 annual conference - Volume 110.1145/800182.810400(180-186)Online publication date: 1-Jan-1974
  • (1972)Computer securityACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/1017536.10175374:3(1-12)Online publication date: 1-Sep-1972
  1. A model for access control

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGFIDET '71: Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
    November 1971
    368 pages
    ISBN:9781450373005
    DOI:10.1145/1734714
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 November 1971

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,028
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (1974)Access control in a relational data base management system by query modificationProceedings of the 1974 annual conference - Volume 110.1145/800182.810400(180-186)Online publication date: 1-Jan-1974
    • (1972)Computer securityACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/1017536.10175374:3(1-12)Online publication date: 1-Sep-1972

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media