Access Control: Principles and Solutions
S. De Capitani di Vimercati and S. Paraboschi, DTI–Università di Milano, Italy
Pierangela Samarati, DIGI–Università di Bergamo, Italy
Access Control in Operating Systems
Access Control in Database Management Systems
Access Control for Internet-Based Solutions
INTRODUCTION
An important requirement of any system is to protect its data and resources against unauthorized disclosure (secrecy or confidentiality) and unauthorized or improper modifications (integrity), while at the same time ensuring their availability to legitimate users (no denial-of-service or availability) (Samarati & De Capitani di Vimercati, 2001). The problem of ensuring protection has existed since information has been managed. However, as technology advances and information management systems become more and more powerful, the problem of enforcing information security also becomes more critical. The increasing development of information and communication technology has led to the widespread use of computer systems to store and transmit information of every kind, offering concrete advantages in terms of availability and flexibility but at the same time posing new serious security threats and increasing the potential damage that violations may cause. ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.