DocumentCode :
2561909
Title :
Issues in Discretionary Access Control
Author :
Downs, Deborah D. ; Rub, Jerzy R. ; Kung, Kenneth C. ; Jordan, Carole S.
fYear :
1985
fDate :
22-24 April 1985
Firstpage :
208
Lastpage :
208
Abstract :
This paper discusses the types of mechanisms that can be used to implement Discretionary Access Control (DAC). It also covers the access types that can be controlled by a DAC mechanism. and includes a brief discussion of related topics including protected subsystems; administering, auditing, and verifying DAC; and DAC implemented as an add-on to an operating system. Finally this paper discusses how the DAC information presented in this paper will be used by the Department of Defense Computer Security Center in the preparation of a DAC Guideline to aid system designers and developers in their selection of DAC mechanisms.
Keywords :
Access control; File systems; Operating systems; Permission; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1985 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1540-7993
Print_ISBN :
0-8186-0629-0
Type :
conf
DOI :
10.1109/SP.1985.10014
Filename :
6234824
Link To Document :
بازگشت