Title :
Issues in Discretionary Access Control
Author :
Downs, Deborah D. ; Rub, Jerzy R. ; Kung, Kenneth C. ; Jordan, Carole S.
Abstract :
This paper discusses the types of mechanisms that can be used to implement Discretionary Access Control (DAC). It also covers the access types that can be controlled by a DAC mechanism. and includes a brief discussion of related topics including protected subsystems; administering, auditing, and verifying DAC; and DAC implemented as an add-on to an operating system. Finally this paper discusses how the DAC information presented in this paper will be used by the Department of Defense Computer Security Center in the preparation of a DAC Guideline to aid system designers and developers in their selection of DAC mechanisms.
Keywords :
Access control; File systems; Operating systems; Permission; Trojan horses;
Conference_Titel :
Security and Privacy, 1985 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
Print_ISBN :
0-8186-0629-0
DOI :
10.1109/SP.1985.10014