Access control in operating system

Jacek Lach


Article contains short characteristics of access control models that are usually used in operating systems. Included is also short presentation of access control implementation in Linux operating system as an example of practical usage of described methods.


operating system; access control; Linux

Full Text:

PDF (Polski)


Bell D., LaPadula L.: Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997 Rev. l, MITRE Corporation, Bedford 1975

Boebert W., Kain R.: A Practical Alternative to Hierarchical Integrity Policies. Proceedings of the 8th National Computer Security Conference, 1985, s. 18, 27.

Denning D. E.: Alattice model of secure information flow. Communications of the ACM, 1981,24(8), s. 533-536.

Graham G., Denning P.: Protection: principles and practices. Proceedings of the AFIPS Spring Joint Computer Conference, 1972, s. 417-429.

Harrison M., Ruzzo W., Ullman J.: Protection in operating systems. Communications of the ACM, 1976, 19(8), s. 461-471

Kemerer R.: Shared Resource Matrix Methodology: A Approach to Identifying Storage and Timing Channels. ACM Transactions on Computer Systems, 1983,1(3), s. 256-277.

Lampson B.: Protection. Proceedings of the 5th Princeton Conference on Information and System Sciences, 1971, s. 437-443.

Lampson B.: A Note on the Confinement Problem. Communications of the ACM, 1976, 16(10), s. 613-615.

Loscocco P., Smalley S., Muckelbauer P., Taylor R., Turner S., Farrell J.: The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. Proceedings of the 21st National Information Systems Security Conference, 1998, s. 303-314.

Spencer R., Smalley S., Loscocco P., Hibler M., Andersen D., Lepreau J.: The Fiask Security Architecture: System Support for Diverse Security Policies. Proceedings of the Eighth USENIX Security Symposium, 1999, s. 123-139.

Wright C., Cowan C., Morris J., Smalley S., Kroah Hartman G.: Linux security modules:General security support for the Linux kernel. Proceedings of the USENIX Security Symposium, 2002