Lecture 6 - Access Control and Information Ownership
Lecture 6 - Access Control and Information Ownership
Ownership
Lecture 6
Access Control
• “The prevention of unauthorized use of a resource,
including the prevention of use of a resource in an
unauthorized manner”.
Many-to-many
relationship between
users and roles
ICAM
4. Identity verification of
individuals from external
organizations 3. Management of how access
is granted to entities
Abstract Models of Access
Control
Subjects and Objects
• Subjects
– can be processes, modules, roles
• Objects
– can be files, processes, etc.
A B C D
alice r r/w r -
bob r r - r/w
subjects
charlie - - w -
dave r/w - w
Grouping
• Subjects
– Groups e.g. staff = {alice,dave}, students = {bob, charlie}
• Objects
– Types e.g. system_file = {A,B}, user_file = {C,D}