Synonyms
Related Concepts
Definition
Access Control List (ACL) is a list of permissions associated with an object. It describes the access rights of an object for a list of subjects.
Background
Access control in computer systems is a universal problem. It explores the means of granting/rejecting access with particular rights (such as read, write, execute) to subjects on certain objects. The concept of access control is generic in the sense that it can be applied to many systems in a computerized environment. For example, in the case of an operating system, the subjects are users and the objects are files, programs, peripheral devices, etc., while for a database system, objects are listed as tables, queries, and procedures.
As computer systems become more complex with rapidly developing technology, access control is becoming more important. Because controlling access in the first hand is the actual gateway to the system, a...
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsRecommended Reading
Hu VC, Ferraiolo DF, Kuhn DR (2006) Assessment of access control systems. NIST Interagency Report 7316, National Institute of Standards and Technology, Gaithersburg, MD
Lampson BW (1971) Protection. In: Proceedings of the 5th Princeton conference on information sciences and systems, Princeton. Reprinted in ACM Operating Systems Rev (Jan 1974) 8(1):18–24
Lee AJ, Winslett M (2006) Open problems for usable and secure open systems, usability research challenges for cyberinfrastructure and tools held in conjunction with ACM CHI 2006, April 2006
Pfleeger CP, Pfleeger SL (2002) Security in computing 3rd edn. Prentice Hall, Upper Saddle River
Samarati P, Capitani de Vimercati S (2001) Access control: policies, models, and mechanisms. Lecture notes in computer science, vol 2171. Springer, Berlin, pp 137–196
Grout V, Davies JN (2010) A simplified method for optimising sequentially processed access control lists. In: The proceedings of the sixth advanced international conference on telecommunications (AICT). May 9–15, 2010. Barcelona, Spain, pp 347–352
Bhatt PC (2010) An introduction to operating systems: concepts and practice, 3rd edn. PHI Learning Private Limited, New Delhi, ISBN: 978–81-203–4138-8
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Cankaya, H.C. (2011). Access Control Lists. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_770
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_770
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering