Control de Acceso

Panorama

Imagen tomada de:
InfoSec México

El Control de Acceso es un servicio de seguridad, aunque propiamente no puede ser garantizado con el uso de Criptografía, pero es tan importante como los otros servicios. El Control de Acceso permite tener la garantí­a de que sólo las entidades autorizadas obtendrán acceso a los recursos, es decir, todas aquellas personas que tengan los privilegios necesarios podrán tener acceso a los mismos. El Control de Acceso se clasifica en dos tipos: el control de acceso físico y el control de acceso lógico.

Existen diversos esquemas o políticas de control de acceso, éstas se emplean de acuerdo a las necesidades o recursos que se desean proteger. Entre estos modelos se encuentran: BIBA, RBAC, Willson & Clark, Bell y LaPadula, etc. Cada uno tiene diferentes objetivos, así como diferentes reglas.

Publicaciones

    Español

    1. Análisis Formal del Estándar NIST para Modelos RBAC
    2. Autenticación y control de acceso Seguridad en Redes de Ordenadores
    3. Estándares de seguridad basados en XML para servicios web y web semántica
    4. Un modelo de control de acceso basado en la semántica

    Inglés

    1. A Calculus for Access Control in Distributed Systems
    2. A Contextual Annotation-based Access Control Model for Pervasive Environments
    3. A Mandatory Access Control Policy Model for Information Security Requeriments
    4. A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
    5. A Revised Model For Role-Based Access Control
    6. A Secure Solution for Commercial Digital Libraries
    7. A Semantic Access Control Model for Grid Services
    8. A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments
    9. About Integrity In Security Models
    10. Access Control
    11. Access Control and Operating System Security
    12. Access Control and Operating System Security
    13. Access Control Infrastructure for Digital Objects
    14. Access Control Methodologies
    15. Access Control Methods
    16. Access Control: Policies, Models, and Mechanisms
    17. Access Control: Theory and Practice
    18. An Access Control Model in a Semantic Data Structure: Case Process Modelling of a Bleaching Line
    19. Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
    20. Applying the Semantic Web Layers to Access Control
    21. Assessment of Access Control Systems
    22. Authentication Mechanisms for Physical Access Control
    23. Authentication, Access Control, and Audit
    24. Bell-LaPadula Model
    25. Bell-LaPadula Model
    26. Biba Integrity Model
    27. Biba Integrity Model
    28. Biba Security Model Comparison
    29. Business Process Driven Framework for defining an Access Control Service based on Roles and Rules
    30. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
    31. Context-Aware Access Control for Collaborative Working Environments Based on Semantic Social Networks
    32. Context-Dependent Access Control for Contextual Information
    33. CS 665: Computer System Security
    34. DAC vs. MAC
    35. Distributed system for access control to physical resources based on qualifications
    36. Enforcing Access Control in Social Network Sites
    37. FIPS 201 and Physical Access Control
    38. Flexible Access Control for Dynamic Collaborative Environments
    39. From a Formal Privacy Model to its Implementation
    40. GUIDELINES ON ACCESS CONTROL, SCREENING & MONITORING
    41. Hybrid Multi-module Security Policy Verification
    42. Information Security Architecture-Context Aware Access Control Model for Educational Applications
    43. Inheritance Properties Of Role Hierarchies
    44. Integrity Policies
    45. Introduction to Computer Security - Bell LaPadula
    46. Mandatory Access Control
    47. Mandatory Access Control
    48. Mandatory Flow Control Models
    49. Methods for Access Control: Advances and Limitations
    50. Operating System Security - Control Access Models
    51. Paradigm Regained: Abstraction Mechanisms for Access Control
    52. Personal Identity Verification (PIV) of Federal Employees and Contractors
    53. Policies, Models, and Languages for Access Control
    54. Policy-based Hybrid Management Architecture for IP-based VPN
    55. Reflective Enforcement of the Clark-Wilson Integrity Model
    56. Role Based Access Control on MLS System without Kernel Changes
    57. Role Hierarchies and Constraints for Lattice-Based Access Controls
    58. Role-Based Access Control Features in Commercial Database Management Systems
    59. Role-Based Access Control Models
    60. Role-Based Access Controls
    61. Rule-Set Modeling of a Trusted Computer System
    62. Secure Computer Systems: Mathematical Foundations
    63. Secure Content Distribution for Digital Libraries
    64. Security Architecture Model Component Overview
    65. Security Models
    66. Security Models
    67. Security Models and Architecture
    68. Security Policies
    69. Semantic Access Control
    70. Semantic Access Control Model: A Formal Specification
    71. Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints
    72. The Bell-LaPadula Model
    73. The Complexity of Discretionary Access Control
    74. The Constitutionality of Mandated Access Control: A Model
    75. The Economic Impact of Role-Based Access Control
    76. The Evolution of Access Control Models
    77. Trusted Computer System Evaluation Criteria
    78. Usable Access Control for the WorldWideWeb
    79. Verification of an Integrated Role-Based Access Control Model
    80. XML-based Distributed Access Control System

    Software

      Español

      1. ACCESOR
      2. SYSCOM

      Video

        Español

        1. Access Control
        2. Paradigm Regained: Abstraction Mechanisms for Access Control