This module explores access control, examining how to define and implement policies that restrict unauthorized access to systems, data, and resources in cybersecurity environments.
Bell, David E, and Leonard J. La Padula. “Secure Computer Systems: Mathematical Foundations.” ESD-TR-73-278, Vol. I, Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA 01731 (Nov. 1973).
Wagner, David, and Dean Tribble. “A Security Analysis of the Combex DarpaBrowser Architecture,” March 4, 2002.
Watson, Robert N. M. “A decade of OS access-control extensibility.” Communications of the ACM 56(2), February 2013.
D Elliot Bell, and Len LaPadula. “Secure Computer System: Unified Exposition and Multics Interpretation.” Technical Report ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731 (1975). Read pp1-48, 64-73 only.
Butler Lampson. “A Note on the Confinement Problem,” Communications of the ACM 16(10) (Oct 1973).
×
You have not selected any articles yet.
×
How the curriculum builder works
Make sure you select your site language before adding articles.
Choose a curriculum category.
Browse all the articles under the selected curriculum and add the ones you need to your list.
We use cookies to operate this website, improve useability, personalize your experience, and improve our marketing. Your privacy is important to us, and we will never sell your data.AcceptRejectPrivacy policy