Skip to main content

Access Control Lists

  • Reference work entry

Synonyms

Access lists

Related Concepts

Access Control from as OS Security Perspective

Definition

Access Control List (ACL) is a list of permissions associated with an object. It describes the access rights of an object for a list of subjects.

Background

Access control in computer systems is a universal problem. It explores the means of granting/rejecting access with particular rights (such as read, write, execute) to subjects on certain objects. The concept of access control is generic in the sense that it can be applied to many systems in a computerized environment. For example, in the case of an operating system, the subjects are users and the objects are files, programs, peripheral devices, etc., while for a database system, objects are listed as tables, queries, and procedures.

As computer systems become more complex with rapidly developing technology, access control is becoming more important. Because controlling access in the first hand is the actual gateway to the system, a...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Hu VC, Ferraiolo DF, Kuhn DR (2006) Assessment of access control systems. NIST Interagency Report 7316, National Institute of Standards and Technology, Gaithersburg, MD

    Google Scholar 

  2. Lampson BW (1971) Protection. In: Proceedings of the 5th Princeton conference on information sciences and systems, Princeton. Reprinted in ACM Operating Systems Rev (Jan 1974) 8(1):18–24

    Google Scholar 

  3. Lee AJ, Winslett M (2006) Open problems for usable and secure open systems, usability research challenges for cyberinfrastructure and tools held in conjunction with ACM CHI 2006, April 2006

    Google Scholar 

  4. Pfleeger CP, Pfleeger SL (2002) Security in computing 3rd edn. Prentice Hall, Upper Saddle River

    Google Scholar 

  5. Samarati P, Capitani de Vimercati S (2001) Access control: policies, models, and mechanisms. Lecture notes in computer science, vol 2171. Springer, Berlin, pp 137–196

    Google Scholar 

  6. Grout V, Davies JN (2010) A simplified method for optimising sequentially processed access control lists. In: The proceedings of the sixth advanced international conference on telecommunications (AICT). May 9–15, 2010. Barcelona, Spain, pp 347–352

    Google Scholar 

  7. Bhatt PC (2010) An introduction to operating systems: concepts and practice, 3rd edn. PHI Learning Private Limited, New Delhi, ISBN: 978–81-203–4138-8

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Cankaya, H.C. (2011). Access Control Lists. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_770

Download citation

Publish with us

Policies and ethics