An analysis of access control models

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

2 Citations (Scopus)


Access control in real systems is implemented using one or more abstractions based on the access control matrix (ACM). The most common abstractions are access control lists (ACLs) and capabilities. In this paper, we consider an extended Harrison-Ruzzo-Ullman (HRU) model to make some formal observations about capability systems versus access control list based systems. This analysis makes the characteristics of these types of access control mechanisms more explicit and is intended to provide a better understanding of their use. A combined model providing the flexibility of capabilities with the simplicity of the ACL and its relation to other models proposed earlier (e.g.[10,6]) are discussed.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 4th Australasian Conference, ACISP 1999, Proceedings
EditorsJosef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Number of pages13
ISBN (Electronic)9783540489702
ISBN (Print)3540657568, 9783540657569
Publication statusPublished - 1999
Externally publishedYes
Event4th Australasian Conference on Information Security and Privacy, ACISP - 1999 - Wollongong, Australia
Duration: 7 Apr 19999 Apr 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)03029743
ISSN (Electronic)16113349


Other4th Australasian Conference on Information Security and Privacy, ACISP - 1999


Dive into the research topics of 'An analysis of access control models'. Together they form a unique fingerprint.

Cite this