Authors
Ravi S Sandhu, Pierangela Samarati
Publication date
1994/9
Journal
IEEE communications magazine
Volume
32
Issue
9
Pages
40-48
Publisher
IEEE
Description
Access control constrains what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way access control seeks to prevent activity that could lead to a breach of security. This article explains access control and its relationship to other security services such as authentication, auditing, and administration. It then reviews the access matrix model and describes different approaches to implementing the access matrix in practical systems, and follows with a discussion of access control policies commonly found in current systems, and a brief consideration of access control administration.< >
Total citations
199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024814161314203246585970856979757989761211121039794108102991131179650
Scholar articles
RS Sandhu, P Samarati - IEEE communications magazine, 1994