Access Control

This module explores access control, examining how to define and implement policies that restrict unauthorized access to systems, data, and resources in cybersecurity environments.

Portal > Cybersecurity > Access Control

Curriculum Builder

Bell, David E, and Leonard J. La Padula. “Secure Computer Systems: Mathematical Foundations.” ESD-TR-73-278, Vol. I, Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA 01731 (Nov. 1973).

Wagner, David, and Dean Tribble. “A Security Analysis of the Combex DarpaBrowser Architecture,” March 4, 2002.

Watson, Robert N. M. “A decade of OS access-control extensibility.” Communications of the ACM 56(2), February 2013.

D Elliot Bell, and Len LaPadula. “Secure Computer System: Unified Exposition and Multics Interpretation.” Technical Report ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731 (1975). Read pp1-48, 64-73 only.

Butler Lampson. “A Note on the Confinement Problem,” Communications of the ACM 16(10) (Oct 1973).