Computer access control policy choices

@article{Olson1990ComputerAC,
  title={Computer access control policy choices},
  author={Ingrid M. Olson and Marshall D. Abrams},
  journal={Computers & Security},
  year={1990},
  volume={9},
  pages={699-714}
}
This paper provides a guide-a road map-for refining a high-level information dissemination/control policy into an implementable access control policy. This process involves determining the appropriate set of policy-oriented limitations and can take place at many levels, from a top-level corporate decision to a hardware implementation choice. The paper discusses many of the choices that need to be made in the process and some of the implications of making each decision. A discussion of the… CONTINUE READING

Tables and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-6 OF 6 CITATIONS

Domain-based security for distributed object systems

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

System architecture for SQL injection and insider misuse detection system for DBMS

  • 2008 International Symposium on Information Technology
  • 2008
VIEW 1 EXCERPT
CITES BACKGROUND

Security In Databases : A Survey

StudyAhmad, Baraani-Dastjerdi, +3 authors NainiDepartment
  • 1996
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.