Acl-based security model, Other Subject

Assignment Help:

ACL BASED SECURITY MODEL

In an ACL-based security model, when a subject needs to execute an operation on an object, the system first verify the list for an appropriate entry in order to choose whether to carry on with the process. A main issue in the definition of any ACL-based security model is the question of how access control lists are shortened. For every object; who can change the object's ACL and what alter are allowed.

Systems that utilize ACLs can be classified into two categories: mandatory and discretionary. A system is said to have optional access control if the owner or creator of an object can completely control access to the object, counting, for instance, changing the object's ACL to grant access to anybody else. A system is said to have optional access control (also known as "non-discretionary access control" in the security literature) if it enforces system-wide restrictions that dominate the permissions stated in the ACL.

Conventional ACL systems allocate permissions to each user, which can become unwieldy in a system with an excess of users. In a more current approach called role-based access organize, permissions are allocated to position, and users are assigned to roles.


Related Discussions:- Acl-based security model

Differential amplifier, derivation of differential voltage gain for dual in...

derivation of differential voltage gain for dual input unbalanced output

Security considerations in electronic fund transfer, SECURIT Y CONSIDERATI...

SECURIT Y CONSIDERATIONS Informatio n security is a way of protecting information and information systems from illegal use, disclosure, access, disruption, destruction or m

Dental nurse, how do you carry health and safety act at your work place

how do you carry health and safety act at your work place

Off-line anonymous electronic money, OFF-LINE ANONYMOUS ELECTRONIC MONEY ...

OFF-LINE ANONYMOUS ELECTRONIC MONEY In off-line electronic money the merchant does not require to cooperate with the bank before accepting a coin from the user. In its place he

Symmetric cryptography, Symmetric Cryptography Until recently, symmetri...

Symmetric Cryptography Until recently, symmetric encryption techniques were used to secure information transmitted on public networks. Traditional, symmetric cryptographic syst

Describe what is meant by psychotherapy, Problem: a. Describe what is m...

Problem: a. Describe what is meant by psychotherapy? b. Explain three steps that you would normally follow in a counselling process. c. Describe the core principles of th

Ben quilty, What training did ben undertake to become an artist

What training did ben undertake to become an artist

Library catalog, What are the importance of dictionary catalog?.

What are the importance of dictionary catalog?.

Describe the treatment options available, In the laboratory, we produce tho...

In the laboratory, we produce thousands of test results every day. It can be easy to forget that each sample has a patient's story behind it, in which the Haematology result that w

Criminology, To what extent might a defense attorney use the Twinkie Defens...

To what extent might a defense attorney use the Twinkie Defense as a springboard for other defenses?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd