Acl-based security model, Other Subject

ACL BASED SECURITY MODEL

In an ACL-based security model, when a subject needs to execute an operation on an object, the system first verify the list for an appropriate entry in order to choose whether to carry on with the process. A main issue in the definition of any ACL-based security model is the question of how access control lists are shortened. For every object; who can change the object's ACL and what alter are allowed.

Systems that utilize ACLs can be classified into two categories: mandatory and discretionary. A system is said to have optional access control if the owner or creator of an object can completely control access to the object, counting, for instance, changing the object's ACL to grant access to anybody else. A system is said to have optional access control (also known as "non-discretionary access control" in the security literature) if it enforces system-wide restrictions that dominate the permissions stated in the ACL.

Conventional ACL systems allocate permissions to each user, which can become unwieldy in a system with an excess of users. In a more current approach called role-based access organize, permissions are allocated to position, and users are assigned to roles.

Posted Date: 10/13/2012 2:10:59 AM | Location : United States







Related Discussions:- Acl-based security model, Assignment Help, Ask Question on Acl-based security model, Get Answer, Expert's Help, Acl-based security model Discussions

Write discussion on Acl-based security model
Your posts are moderated
Related Questions
what are the internal controls of online real time systems

Test the hypothesis that the proportion favoring Romney in the Gallop poll is the same as the proportion favoring Romney in the Rasmussen poll against the alternative that the prop


Question 1 Describe Plato's concept of education Question 2 Critically Describe Locke's Social Contract Theory Question 3 Describe  Bentham's views on jurispru

Theories of Human Communication: Human communication occurs while one or more people send and receive messages. All of the communication acts have the following elements: sources,

What two influencial artistic movements grew out of western Europe

I have 2 questions , they are in jpg form . I wonder how can I submit them> thanks

character attacks are common to which style of handling conflict

is visito a regular or irregular verb

QUESTION 1 Governance may be viewed as a new method by which society is governed. What are the important characteristics which contribute to the achievement of Good Governance?