The goal of access control is to protect confidentiality and integrity of information. Controlling what a subject can do (by regulating the operations that can be executed by a subject on data and resources) can help in preventing damage to the system.
- typically, access control is provided as a part of operating systems and database management systems
RFC 4949
(Access control is) a process by which use of system resources is regulated according to a security policy and is permitted only by authorized entities (users, programs, processes, or other systems) according to that policy.
concepts
access control modes
Discretionary Access Control (DAC)
Controls access based on the identity of the requestor and its access rules, stating what requestors are or are not allowed to do.
- an entity may be granted access rights that permit it to enable another entity to access some resource
The rules are often provided via access matrix, access control list (ACL) or extended access control matrix.
access matrix
- an empty cell means that no access rights are granted
Access Control Lists
- defines a list called “access control list” for each object, which enumerates the subjects that have access rights and, for each subject, which rights
ACLs take a subject-centered approach to access control.
It can also be seen this way, from the subjects’ perspective:



