Paper
23 August 2023 Overview of security access control mechanisms
Hao Yang, Junyang Yu, Shuang Tang, Yushuai Hu
Author Affiliations +
Proceedings Volume 12784, Second International Conference on Applied Statistics, Computational Mathematics, and Software Engineering (ASCMSE 2023); 127843E (2023) https://doi.org/10.1117/12.2691877
Event: 2023 2nd International Conference on Applied Statistics, Computational Mathematics and Software Engineering (ASCMSE 2023), 2023, Kaifeng, China
Abstract
As the core of a computer system, the operating system stores a large amount of sensitive data and critical resources, and in order to ensure the security of these resources, security access control technology has come into being. Security access control technology plays an important role in operating system security. It effectively prevents security risks such as information leakage, data corruption and system breakdown by restricting and controlling users' access to system resources. Security access control technology not only restricts the resources that users can access, but also ensures that users can only perform operations within their authorization, thus protecting the confidentiality, integrity and availability of the system. Security access control technologies use a variety of policies and mechanisms to achieve precise control and protection of resources. These technologies manage and restrict user access through roles, permissions, tags and policies to ensure that only authorized users can access sensitive data and resources, thereby maintaining the stability and trustworthiness of the operating system.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Hao Yang, Junyang Yu, Shuang Tang, and Yushuai Hu "Overview of security access control mechanisms", Proc. SPIE 12784, Second International Conference on Applied Statistics, Computational Mathematics, and Software Engineering (ASCMSE 2023), 127843E (23 August 2023); https://doi.org/10.1117/12.2691877
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Control systems

Computer security

Security technologies

Information security

Network security

Computing systems

Operating systems

Back to Top