Access Control
Authentication - are you who you say you are
Authorization - What are you allowed to access
Access Control Matrix (ACM)
Rows are subjects, columns are objects (files/resources)
tracks which users/subjects/groups can access what resources
ACM is large, use Access Control List
each object (O(i)) stores a list of users and their permissions
TTC TTU attack
The state of a resource is checked before it is used but the state could change between the check and use in a way that invalidates the use
Race Condition
Role Based Access Control
Access is based on a role of some sort.
Users are sorted into groups and groups are given access