Access Control and Authorization
Part of the Computer Communications and Networks book series (CCN)
Access control is a process to determine “Who does what to what,” based on a policy.
KeywordsAccess Control Smart Card System Resource Biometric Technology Authorization Process
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
- 1.Panko RR (2004) Corporate computer and network security. Prentice-Hall, Upper Saddle RiverGoogle Scholar
- 2.Gollman D (2000) Computer security. Wiley, New YorkGoogle Scholar
- 3.An Introduction to Role-based Access Control. NIST/ITL Bulletin, December, 1995. http://csrc.nist.gov/rbac/NIST-ITL-RBAC-bulletin.html
- 4.Differentiating Between Access Control Terms. http://secinf.net/uplarticle/2/Access_Control_WP.pdf
- 5.Byers S, Freire J, Silva C. Efficient acquisition of web data through restricted query interfaces. AT&T Labs-Research. http://www10.org/cdrom/posters/p1051/
- 6.Bannan K. Watching you, watching me PCs are turning informant. Whose side are they on? PC Magazine, July 1, 2002, http://www.pcmag.com/article2/0,4149,342208,00.asp
- 8.NASA World Wide Web Best Practices (2000–2001) Draft version 2.0. http://nasa-wbp.larc.nasa.gov/devel/4.0/4_4.html
- 9.Pipkin D (2000) Information security: protecting the global enterprise. Prentice-Hall, Upper Saddle RiverGoogle Scholar
- 10.Kahan J. A distributed authorization model for WWW. May, 1995. http://www.isoc.org/HMP/PAPER/107/html/paper.html. Accessed on 5/6/2003
- 11.NASA. World wide web best practices 2000–2001 draft version 2.0. 8/20/2000. http://nasa-wbp.larc.nasa.gov/devel/4.0/4_4.html. 5/6/2003
© Springer International Publishing AG 2017