Acl-based security model, Other Subject

ACL BASED SECURITY MODEL

In an ACL-based security model, when a subject needs to execute an operation on an object, the system first verify the list for an appropriate entry in order to choose whether to carry on with the process. A main issue in the definition of any ACL-based security model is the question of how access control lists are shortened. For every object; who can change the object's ACL and what alter are allowed.

Systems that utilize ACLs can be classified into two categories: mandatory and discretionary. A system is said to have optional access control if the owner or creator of an object can completely control access to the object, counting, for instance, changing the object's ACL to grant access to anybody else. A system is said to have optional access control (also known as "non-discretionary access control" in the security literature) if it enforces system-wide restrictions that dominate the permissions stated in the ACL.

Conventional ACL systems allocate permissions to each user, which can become unwieldy in a system with an excess of users. In a more current approach called role-based access organize, permissions are allocated to position, and users are assigned to roles.

Posted Date: 10/13/2012 2:10:59 AM | Location : United States







Related Discussions:- Acl-based security model, Assignment Help, Ask Question on Acl-based security model, Get Answer, Expert's Help, Acl-based security model Discussions

Write discussion on Acl-based security model
Your posts are moderated
Related Questions
Problem 1 a) Why does the public sector exist? b) Discuss 5 ways in which the public sector is different from the private sector. c) "The public sector is a closed system

tulaliloo ti amo

Property' is a Relative Concept Since the physical, legal and moral conditions of excludability may vary according to time and circumstance, it becomes clear that the notion of

Ask question #MiniCompare and contrast German Nazism and Stalin’s Soviet Communism (Stalinism). What were the similarities and differences between these two political ideologies? U

Importance of Human Communication: Communication, indirectly and directly, plays vital role in society: I am looking for assignment help on the topic Importance of Human Communica

Question: (a) Name five Pre-press operations which are usually done by the press? (b) Stripping and Imposition refer to the plan and arrangement of pages so that when print

How do I get stared? Do I start from the beginning of chapter 1?

The constitutional rights guaranteed in the Bill of Rights are most highly protected during the trial stage of a criminal proceeding. This is when the adversarial process, which ch

which city is located on 35 north latitude 80 west longitude

Question 1 Write a long note on public speech coverage Question 2 Write a detailed note on development reporting Question 3 Write a note on verification and the techniqu