Access Control

This module explores access control, examining how to define and implement policies that restrict unauthorized access to systems, data, and resources in cybersecurity environments.

Portal > Cybersecurity > Access Control

Curriculum Builder

Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

https://doi.org/10.1145/362375.362389

Bell, David E., and Leonard J. La Padula. “Secure Computer System: Unified Exposition and Multics Interpretation.” Technical Report ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731, 1975.

Watson, Robert N. M. “A Decade of OS Access-Control Extensibility.” Communications of the ACM 56, no. 2 (2013): 52–63.

https://doi.org/10.1145/2408776.2408792

Wagner, David, and Dean Tribble. “A Security Analysis of the Combex DarpaBrowser Architecture,” March 4, 2002.

http://www.combex.com/papers/darpa-review/security-review.pdf

Bell, David E, and Leonard J. La Padula. “Secure Computer Systems: Mathematical Foundations.” ESD-TR-73-278 Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA 01731 1 (November 1973).

https://apps.dtic.mil/sti/pdfs/AD0770768.pdf

Thank you for signing up to our newsletter!

Thank you! RSVP received for Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

Thank you for applying! We will be in touch.

Apply for: Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.

Loading...

Loading…