Loading...

Course Description

Access control mechanisms ensure that a user is able to read and/or update only certain objects. With discretionary access control, it is the creator of an object who decides which other users should have access. A broad set of mechanisms have been developed to enforce discretionary access control in a computing system. This course will survey the two approaches widely used in these mechanisms: access control lists and capabilities. Through the use of case studies, you will review the pragmatics of implementations in processor hardware, operating systems, and programming languages.

It is recommended to only take this course if you have completed “Systems Security,” “Authenticating Machines,” and “Authenticating Humans,” or have equivalent experience.

Faculty Author

Fred Schneider

Benefits to the Learner

  • Determine whether discretionary access control is appropriate for a given system
  • Categorize given authorization schemes as either access control lists or capabilities lists
  • Design a capability implementation that satisfies particular properties
  • Recognize the challenges of implementing discretionary access control schemes for real-world systems

Target Audience

  • IT professionals
  • Developers
  • Programmers
  • Analysts
  • Software engineers
  • Cybersecurity professionals

Accrediting Associations

Applies Towards the Following Certificates

Loading...
Cornell Computing and Information Science
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .