Ministry of digital technologies of the republic of


II. CHAPTER. ACCESS CONTROL TECHNIQUES AND THEIR USE IN


Download 1.29 Mb.
Pdf ko'rish
bet14/24
Sana19.06.2023
Hajmi1.29 Mb.
#1614846
1   ...   10   11   12   13   14   15   16   17   ...   24
Bog'liq
MamayusupovShodmon 712-19 (5)

II. CHAPTER. ACCESS CONTROL TECHNIQUES AND THEIR USE IN 
DISTRIBUTED SYSTEMS 
2.1. Methods of access control and their analysis 
Access control technology rising at the last century seventies, it was proposed to 
management the access of shared data in large hosts to ensure only the authorized user 
can access certain data . With the development of the computer technologies, especially 
with the development of web applications, the theories and methods of access control 
are rapidly applied in various fields of information systems. Access control means 
methods to explicitly permit or limit the access ability and scope. Access control are 
used to limit the access of key resources and to prevent the attacks of illegal users and 
the damages the legal users made by careless operations. In brief, the problem the 
access control solved is “When and where, who can operate what resources”. The main 
access control technologies include DAC (Discretionary Access Control), MAC 
(Mandatory Access Control), RBAC (Role-based Access Control) and RB-RBAC 
(Rule-Based Access Control). Below, I will define access control and talk about the 4 
access control models. I will also describe the methods of logical access control 
and explain the different types of physical access control [9]. 
Access control is the process of: 
1) 
identifying a person doing a specific job; 
2) 
authenticating them by looking at their identification; 
3) 
granting a person only the key to the door or computer that they need 
access to and nothing more; 
4) 
In information security, one would look at this as; 
5) 
granting an individual permission to get onto a network via a username 
and password; 
6) 
allowing them access to files, computers, or other hardware or software 
they need; 
7) 
ensuring they have the right level of permission to do their job. 


37 
 1. The Mandatory Access Control, or MAC, model gives only the owner and 
custodian management of the access controls. This means the end user has no control 
over any settings that provide any privileges to anyone. Now, there are two security 
models associated with MAC: Biba and Bell-LaPadula (2.1-figure). 
The Biba model is focused on the integrity of information, whereas the Bell-
LaPadula model is focused on the confidentiality of information. Biba is a setup where 
a user with low-level clearance can read higher-level information (called “read up”) 
and a user with high-level clearance can write for lower levels of clearance (called 
“write down”). The Biba model is typically utilized in businesses where employees at 
lower levels can read higher-level information and executives can write to inform the 
lower-level employees. 
Bell-LaPadula, on the other hand, is a setup where a user at a higher level (i.e. 
Top Secret) can only write at that level and no lower (called “write up”), but can also 
read at lower levels (called “read down”). Bell-LaPadula was developed for 
governmental and/or military purposes where if one does not have the correct clearance 
level and does not need to know certain information, they have no business with the 
information. 
At one time, MAC was associated with a numbering system that would assign a 
level number to files and level numbers to employees. This system made it so that if a 
file (i.e. myfile.ppt) had is level 400, another file (i.e. yourfile.docx) is level 600 and 
the employee had a level of 500, the employee would not be able to access 
“yourfile.docx” due to the higher level (600) associated with the file. 
MAC is the highest access control there is and is utilized in military and/or 
government settings utilizing the classifications of Classified, Secret, and Unclassified 
in place of the numbering system previously mentioned. 


38 
2.1-figure. The scheme of Mandatory Access Control(MAC).

Download 1.29 Mb.

Do'stlaringiz bilan baham:
1   ...   10   11   12   13   14   15   16   17   ...   24




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling