Moffatt, Sam (2010) There and back again: a history of access control systems. In: MSC Malaysia Open Source Conference, 29 June - 1 July 2010, Kuala Lumpur, Malaysia.
Text (Joomla! History Slides)
Available under License Creative Commons Attribution Non-commercial Share Alike.
What MULTICS feature has influenced both operating system design and process architecture? Which security model has become the standard for defining discretionary access control? What is the most pervasive attributed based access control system available today? Which open source application's security model distinguishes normal discretionary access control from the ability to view an item? All of these questions will be answered and more in a history of computer security examining different features of security models from MULTICS to Mac OS X. A great introduction to security systems in general.
Statistics for this ePrint Item
|Item Type:||Conference or Workshop Item (Commonwealth Reporting Category E) (Lecture)|
|Publisher:||Open Source Developers Club Malaysia|
|Item Status:||Live Archive|
|Additional Information (displayed to public):||No evidence of copyright restrictions.|
|Depositing User:||Mr Sam Moffatt|
|Faculty / Department / School:||Current - Division of Academic Services - Library|
|Date Deposited:||30 Jun 2010 23:38|
|Last Modified:||08 Aug 2014 00:06|
|Uncontrolled Keywords:||security systems; access control systems|
|Fields of Research (FoR):||08 Information and Computing Sciences > 0806 Information Systems > 080607 Information Engineering and Theory|
Actions (login required)
|Archive Repository Staff Only|