Partenaire Premium

Access Control UNICAM

UNICAM AC Partial 2

UNICAM AC Partial 2


Fichier Détails

Cartes-fiches 71
Langue English
Catégorie Informatique
Niveau Université
Crée / Actualisé 04.12.2021 / 04.12.2021
Attribution de licence Non précisé
Lien de web
https://card2brain.ch/box/20211204_access_control_unicam
Intégrer
<iframe src="https://card2brain.ch/box/20211204_access_control_unicam/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

Why do we need Access Control - whats is the purpose?

We need a language for expressing our intended access control policies together wit a mechanism to enforce this access control behavior.We need a language for expressing our intended access control policies together wit a mechanism to enforce this access control behavior.

What do we need to consider for shared data in terms of security?

  • Integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life cycle.
  • Confidentiality deals with protecting against the disclosure of information by ensuring that the data is limited to those authorized

Basic Terminology for AC

How do we call the active entity?

Subject or Principal

Basic Terminology for AC

How do we call the passive entity?

Object

Basic Terminology for AC

How do we call the process?

Access Operation

Basic Terminology for AC

How do we call logic behind AC?

Reference Monitor

What does the subject do in AC?

Performs an operation - wants to access something

What are Object examples?

Files, folders, printers, memory