Brain Dump

Access Control Model

Tags
security

[see page 22, Oversees] the permissions a user has and the interactions they can perform with various objects in a system, essentially enforces the access control policy. Typical models focus on authorisation:

  • Who is allowed to do what?
  • How do you update/change the system

\[ \text{Subject} \times \text{Object} \times \text{Request} \]

Note: A [see page 24, policy] defines what you want to do, a model describes how you implement a policy.

Access control can come in [see page 23, various] ways:

FormDescription
Physical ProtectionGates, Turnstiles
Network trafficFirewalls
HardwareMemory management
Operating systemFile system
Application LevelGoogle login, databases