Access Control: The Neglected Frontier

Access control is an indispensable security technology. However, it has been relatively neglected by the research community. Over the past ten years, the doctrine of mandatory and discretionary access controls has slowly become discredited but no dominant doctrine has emerged to replace it. There are promising candidates such as role and task-based access controls but these are still in their formative stages and have not gained wide acceptance. This paper gives my personal perspective on these issues and identifies some of the important access control issues that researchers and practitioners should focus on.

[1]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[2]  Mary Ellen Zurko,et al.  A VMM security kernel for the VAX architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[4]  Ravi S. Sandhu,et al.  On testing for absence of rights in access control models , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.

[5]  Simon N. Foley,et al.  Aggregation and Separation as Noninterference Properties , 1992, J. Comput. Secur..

[6]  K J Biba,et al.  Integrity Considerations for Secure Computer Systems , 1977 .

[7]  Ronald Fagin,et al.  On an authorization mechanism , 1978, TODS.

[8]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[9]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[10]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[11]  Bradford W. Wade,et al.  An authorization mechanism for a relational database system , 1976, TODS.

[12]  Ravi Sandhu,et al.  Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[13]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[14]  Peter J. Denning,et al.  Protection: principles and practice , 1972, AFIPS '72 (Spring).

[15]  Richard J. Lipton,et al.  A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.

[16]  Ravi S. Sandhu Expressive Power of the Schematic Protection Model , 1992, J. Comput. Secur..

[17]  Morris Sloman,et al.  The source of authority for commercial access control , 1988, Computer.

[18]  Steven B. Lipner,et al.  Non-Discretionery Controls for Commercial Applications , 1982, 1982 IEEE Symposium on Security and Privacy.

[19]  Ravi S. Sandhu Mandatory Controls for Database Integrity , 1989, DBSec.

[20]  Ravi S. Sandhu,et al.  Rationale for the RBAC96 family of access control models , 1996, RBAC '95.

[21]  Ravi S. Sandhu,et al.  Lattice-based access control models , 1993, Computer.

[22]  Ravi S. Sandhu,et al.  The Extended Schematic Protection Model , 1992, J. Comput. Secur..

[23]  Theodore M. P. Lee,et al.  Using mandatory integrity to enforce 'commercial' security , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[24]  Elisa Bertino,et al.  A model of authorization for next-generation database systems , 1991, TODS.

[25]  Teresa F. Lunt Access control policies: Some unanswered questions , 1989, Comput. Secur..

[26]  Ravi S. Sandhu,et al.  Conceptual foundations for a model of task-based authorizations , 1994, Proceedings The Computer Security Foundations Workshop VII.

[27]  Ravi S. Sandhu,et al.  The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.

[28]  Ravi Sandhu,et al.  Expressive power of access control models based on propagation of rights , 1996 .

[29]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[30]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[31]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.