Acl-based security model, Other Subject

ACL BASED SECURITY MODEL

In an ACL-based security model, when a subject needs to execute an operation on an object, the system first verify the list for an appropriate entry in order to choose whether to carry on with the process. A main issue in the definition of any ACL-based security model is the question of how access control lists are shortened. For every object; who can change the object's ACL and what alter are allowed.

Systems that utilize ACLs can be classified into two categories: mandatory and discretionary. A system is said to have optional access control if the owner or creator of an object can completely control access to the object, counting, for instance, changing the object's ACL to grant access to anybody else. A system is said to have optional access control (also known as "non-discretionary access control" in the security literature) if it enforces system-wide restrictions that dominate the permissions stated in the ACL.

Conventional ACL systems allocate permissions to each user, which can become unwieldy in a system with an excess of users. In a more current approach called role-based access organize, permissions are allocated to position, and users are assigned to roles.

Posted Date: 10/13/2012 2:10:59 AM | Location : United States







Related Discussions:- Acl-based security model, Assignment Help, Ask Question on Acl-based security model, Get Answer, Expert's Help, Acl-based security model Discussions

Write discussion on Acl-based security model
Your posts are moderated
Related Questions
Question 1: Explain clearly how Public Policy Making constitutes one of the major tasks which have to be accomplished by modern Governments. Question 2: "Policy Formul


Executive Summary Worldwide, the function of ethics in managerial and qualified practices has demonstrated to be a vital concept. This is because the concept of ethics deals with w

Effect of global warming, Write an essay on global warming, It must be free from plagiarism. Why global warming occurs...

Export Control- Cryptographic strategy and technical data concerning them are subject to Federal Government export controls as specified in Title 22, Code of Federal Regulation

You are doing well! The chief of police continues to be impressed with your work. He has hired you again to extend your independent internal review, this time to study policies and

Question 1 How was the establishment of Muslim rule at the end of the twelfth century a turning point in India's cultural history? Question 2 Define Tribe. Explain the si

Test the hypothesis that the proportion favoring Romney in the Gallop poll is the same as the proportion favoring Romney in the Rasmussen poll against the alternative that the prop

Question 1 The Science Daily dated April 05, 2011 stated that for the some days ozone-depleted air masses had extended from the North Pole to southern Scandinavia resulting in

DDBL is located first at ........ ?