Access Control Model
- Tags
- security
[see page 22, Oversees] the permissions a user has and the interactions they can perform with various objects in a system, essentially enforces the access control policy. Typical models focus on authorisation:
- Who is allowed to do what?
- How do you update/change the system
\[ \text{Subject} \times \text{Object} \times \text{Request} \]
Note: A [see page 24, policy] defines what you want to do, a model describes how you implement a policy.
Access control can come in [see page 23, various] ways:
Form | Description |
---|---|
Physical Protection | Gates, Turnstiles |
Network traffic | Firewalls |
Hardware | Memory management |
Operating system | File system |
Application Level | Google login, databases |