An Analysis of Access Control Models

  • Authors:
  • Gregory Saunders;Michael Hitchens;Vijay Varadharajan

  • Affiliations:
  • -;-;-

  • Venue:
  • ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

Access control in real systems is implemented using one or more abstractions based on the access control matrix (ACM). The most common abstractions are access control lists (ACLs) and capabilities. In this paper, we consider an extended Harrison-Ruzzo-Ullman (HRU) model to make some formal observations about capability systems versus access control list based systems. This analysis makes the characteristics of these types of access control mechanisms more explicit and is intended to provide a better understanding of their use. A combined model providing the flexibility of capabilities with the simplicity of the ACL and its relation to other models proposed earlier (e.g.[10,6]) are discussed.