Nothing Special   »   [go: up one dir, main page]

Skip to main content

Discretionary Access Control

  • Reference work entry
  • First Online:
Encyclopedia of Database Systems

Synonyms

DAC; Identity-based access control

Definition

Discretionary access control (DAC) provides for owner-controlled administration of access rights to objects. DAC, as the name implies, permits the granting and revocation of access permissions to be left to the discretion of the individual users. A DAC mechanism allows users to grant or revoke access to any of the objects under their control.

Historical Background

Trusted Computer System Evaluation Criteria (TCSEC) published by the US Department of Defense, commonly known as the Orange Book, defined two important access control modes for information systems: discretionary access control (DAC) and mandatory access control (MAC). As the name implies, DAC allows the creators or owners of files to assign access rights. Also, a user (or subject) with discretionary access to information can pass that information on to another user (or subject). DAC has its genesis in the academic and research setting from which time-sharing systems...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Amazon. Amazon simple storage service (S3). 2011.

    Google Scholar 

  2. Amazon. Amazon web services: risk and compliance (2012), http://media.amazonwebservices.com/.

  3. Bertino E, Samarati P, Jajodia S. Authorizations in relational database management systems. In: Proceedings of the 1st ACM Conference on Computer and Communication Security; 1993. p. 130–9.

    Google Scholar 

  4. Bishop M. Computer security: art and science. Boston: Addison Wesley Professional; 2003.

    Google Scholar 

  5. Calero J, Edwards N, Kirschnick J, Wilcock L, Wray M. Toward a multi-tenancy authorization system for cloud services. IEEE Secur Priv. 2010;8(6):48–55.

    Article  Google Scholar 

  6. Castano S, Fugini MG, Martella G, Samarati P. Database security. Wokingham: Addison Wesley; 1994.

    MATH  Google Scholar 

  7. Fagin R. On an authorization mechanism. ACM Trans Database Syst. 1978;3(3):310–19.

    Article  MathSciNet  Google Scholar 

  8. Ferraiolo DF, Gilbert DM, Lynch N. An examination of federal and commercial access control policy needs. In: Proceedings of the NIST-NCSC National Computer Security Conference; 1993. p. 107–16.

    Google Scholar 

  9. Graham GS, Denning PJ. Protection: principles and practice. In: Proceedings of the AFIPS Spring Joint Computer Conference; 1972. p. 417–29.

    Google Scholar 

  10. Griffiths PP, Wade BW. An authorization mechanism for a relational database system. ACM Trans Database Syst. 1976;1(3):242–55.

    Article  Google Scholar 

  11. Lampson BW. Protection. In: 5th Princeton symposium on information science and systems. 1971. p. 437–43. Reprinted in ACM Oper Syst Rev. 1974;8(1):18–24.

    Article  Google Scholar 

  12. Rabitti F, Bertino E, Kim W, Woelk D. A model of authorization for next-generation database systems. ACM Trans Database Syst. 1991;16(1):88–131.

    Article  Google Scholar 

  13. Sandhu RS, Samarati P. Access control: principles and practice. IEEE Commun. 1994;32(9):40–8.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gail-Joon Ahn .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Ahn, GJ. (2018). Discretionary Access Control. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_135

Download citation

Publish with us

Policies and ethics