ABSTRACT

In Section 3.2.2, we discuss basic concepts such as access control for information systems. Section 3.2.3 provides an overview of the various types of secure systems. Secure operating systems will be discussed in Section 3.2.4. Secure database systems will be discussed in Section 3.2.5. Network security will be discussed in Section 3.2.6. Emerging trends is the subject of Section 3.2.7. Impact of the web is given in Section 3.2.8. An overview of the steps to building secure systems will be provided in Section 3.2.9. Figure 3.2 illustrates the various concepts addressed in this section.

3.2.2 Access Control and Other Security Concepts Access control models include those for discretionary security and mandatory security. In this section, we discuss both aspects of access control and also consider other issues. In discretionary access control models, users or groups of users are granted access to data objects. ese data objects could be files, relations, objects, or even data items. Access control policies include rules such as User U has read access