Access Control Models
1 Access Control Principles
- Who (subject) can do What (operations) on Whom (objects) ?
- Privilege of Least Authority: Who can/ should do an operation P on
object B?  Among the "who", the group that has the least authority
should.
- Develop Fine-Grained Access Control Permissions
- Ex: Read/write permissions are too coarse.  A "back-up operator"
can be given rw permissions – but this is too much.  We can
design/implement a new permission that can "just copy" files.  This
copy operation is fine grained.
- Role Based Access Control (RBAC)
 
 
2 Access Control Models and Mechanisms
- ./DAC.html Discretionary Access Control; Linux default permissions
- ./MAC.html Mandatory Access Control; Users cannot change these policies
- ./LKM.html Linux Kernel Modules
- ./LSM.html Linux Security Modules
- ./selinux.html "Security Enhanced" Linux LSM; contributed by NSA (2000s?)
- ./seandroid.html SELinux adapted to Android
 
 
 
Copyright © 2017 
www.wright.edu/~pmateti • 2017-09-11