NSF-CICI | SAC-PA
News
About
Team
Tutorials
Resources
Workshops
Sponsors
Feedback
NSF - Cybersecurity Innovation for Cyberinfrastructure (CICI)
SAC-PA: Towards
S
ecurity
A
ssured
C
yberinfrastructure in
P
ennsylvani
a
Tutorials of Authentication and Access Control
Table of Contents
1. Identity and Authentication - An Introduction
2. Identification / Biometrics
3. Access Control - Overview of Unix and Windows Security
4. Access Control Matrix Model - Some Foundational Results
5. Security Policies: Bell LaPadula's Confidentiality Model and Biba's Integrity Models
6. Hybrid Security Models - Clark Wilson, Chinese Wall, RBAC
7. Role-based Access Control Standard - ANSI INCITS 359-2004
8. Attribute Based Access Control - An Overview
9. Attribute-based Access Control in Health Informatics Domain
Identity and Authentication - An Introduction
Identification / Biometrics
Access Control - Overview of Unix and Windows Security
Access Control Matrix Model - Some Foundational Results
Security Policies: Bell LaPadula's Confidentiality Model and Biba's Integrity Model
Hybrid Security Models - Clark Wilson, Chinese Wall, RBAC
Role-based Access Control Standard - ANSI INCITS 359-2004
Attribute Based Access Control - An Overview
Attribute-based Access Control in Health Informatics Domain