qOne of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms.q--DTIC.Department of Defense Trusted Computer System Evaluation Criteria, DoD, DoD 5200.28-STD, 1985. 2. ... Bell, D.E. and LaPadula, L.J., aquot;Secure Computer Systems: Unified Exposition and Multics Interpretation, aquot; Tech. report MTR-2997 Rev.
|Title||:||A Guide to Understanding Discretionary Access Control in Trusted Systems|