Distributed Access Control

Submitted by: Submitted by

Views: 10

Words: 1150

Pages: 5

Category: Business and Industry

Date Submitted: 12/19/2015 03:48 PM

Report This Essay

Distributed Access Control between Kudler Fine Foods and its Partners

Dean Gilbert

CMGT/230

August 24, 2015

John Lima

Introduction

Kudler Fine Foods is a specialty food store carrying the very best in domestic and imported gourmet foods in the San Diego metropolitan area. Kudler Fine Foods and its Partners is contemplating using a Distributed Access Control System (DACS). A powerful security of information and security information systems is a necessity for management. Any application that may deal with privacy, financial, identity, or safety, must have ways to control access. Access control is all about controlling allowed activities of its users. With some systems, access is allowed after the successful authentication of a user, but most systems will require additional sophistication and more complex control. The purpose of this paper is to discuss how Kudler Fine Foods will use the Discretionary access control lists (DACL) model between the partners and itself, both to and from its systems.

Kudler and its Partners

Kudler Fine Foods partners include:

* The Customers

* The Vendors

* The Stockholders

* The Accounting Firm

Distributed Access Control System

A Distributed Access Control System, or (DACS) is a light-weight single sign-on and a role-based access control system for the web servers and the server-based software. DACS executes access control by evaluating any access control rules that are described by the administrator.With implementing an access control system, Kudler Fine Foods needs to look at the access control policies. Access control policies are requirements that state how access is managed and who may have access information under what situations. Policies pertain to the use of resources within an organization and can be based on a need-to-know level. An access control model bridges the gap between policy and the mechanism. Rather than trying to evaluate and figure out the access control systems at the mechanism...