Access Control Models
1 Access Control Principles
- Who (subject) can do What (operations) on Whom (objects) ?
- Privilege of Least Authority: Who can/ should do an operation P on
object B? Among the "who", the group that has the least authority
should.
- Develop Fine-Grained Access Control Permissions
- Ex: Read/write permissions are too coarse. A "back-up operator"
can be given rw permissions – but this is too much. We can
design/implement a new permission that can "just copy" files. This
copy operation is fine grained.
- Role Based Access Control (RBAC)
2 Access Control Models and Mechanisms
- ./DAC.html Discretionary Access Control; Linux default permissions
- ./MAC.html Mandatory Access Control; Users cannot change these policies
- ./LKM.html Linux Kernel Modules
- ./LSM.html Linux Security Modules
- ./selinux.html "Security Enhanced" Linux LSM; contributed by NSA (2000s?)
- ./seandroid.html SELinux adapted to Android
Copyright © 2017
www.wright.edu/~pmateti • 2017-09-11