@inproceedings{f57be0986f8b4e1ca2a37cf22f32300f,
title = "An analysis of access control models",
abstract = "Access control in real systems is implemented using one or more abstractions based on the access control matrix (ACM). The most common abstractions are access control lists (ACLs) and capabilities. In this paper, we consider an extended Harrison-Ruzzo-Ullman (HRU) model to make some formal observations about capability systems versus access control list based systems. This analysis makes the characteristics of these types of access control mechanisms more explicit and is intended to provide a better understanding of their use. A combined model providing the flexibility of capabilities with the simplicity of the ACL and its relation to other models proposed earlier (e.g.[10,6]) are discussed.",
author = "Gregory Saunders and Michael Hitchens and Vijay Varadharajan",
year = "1999",
doi = "10.1007/3-540-48970-3_23",
language = "English",
isbn = "3540657568",
volume = "1587",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "281--293",
editor = "Josef Pieprzyk and Rei Safavi-Naini and Jennifer Seberry",
booktitle = "Information Security and Privacy - 4th Australasian Conference, ACISP 1999, Proceedings",
address = "United States",
note = "4th Australasian Conference on Information Security and Privacy, ACISP - 1999 ; Conference date: 07-04-1999 Through 09-04-1999",
}