Access Control and Authorization

  • Joseph Migga Kizza
Part of the Computer Communications and Networks book series (CCN)


Access control is a process to determine “Who does what to what,” based on a policy.


Access Control Smart Card System Resource Biometric Technology Authorization Process 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Panko RR (2004) Corporate computer and network security. Prentice-Hall, Upper Saddle RiverGoogle Scholar
  2. 2.
    Gollman D (2000) Computer security. Wiley, New YorkGoogle Scholar
  3. 3.
    An Introduction to Role-based Access Control. NIST/ITL Bulletin, December, 1995.
  4. 4.
    Differentiating Between Access Control Terms.
  5. 5.
    Byers S, Freire J, Silva C. Efficient acquisition of web data through restricted query interfaces. AT&T Labs-Research.
  6. 6.
    Bannan K. Watching you, watching me PCs are turning informant. Whose side are they on? PC Magazine, July 1, 2002,,4149,342208,00.asp
  7. 7.
  8. 8.
    NASA World Wide Web Best Practices (2000–2001) Draft version 2.0.
  9. 9.
    Pipkin D (2000) Information security: protecting the global enterprise. Prentice-Hall, Upper Saddle RiverGoogle Scholar
  10. 10.
    Kahan J. A distributed authorization model for WWW. May, 1995. Accessed on 5/6/2003
  11. 11.
    NASA. World wide web best practices 2000–2001 draft version 2.0. 8/20/2000. 5/6/2003

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.University of TennesseeChattanoogaUSA

Personalised recommendations