Acl-based security model, Other Subject

Assignment Help:

ACL BASED SECURITY MODEL

In an ACL-based security model, when a subject needs to execute an operation on an object, the system first verify the list for an appropriate entry in order to choose whether to carry on with the process. A main issue in the definition of any ACL-based security model is the question of how access control lists are shortened. For every object; who can change the object's ACL and what alter are allowed.

Systems that utilize ACLs can be classified into two categories: mandatory and discretionary. A system is said to have optional access control if the owner or creator of an object can completely control access to the object, counting, for instance, changing the object's ACL to grant access to anybody else. A system is said to have optional access control (also known as "non-discretionary access control" in the security literature) if it enforces system-wide restrictions that dominate the permissions stated in the ACL.

Conventional ACL systems allocate permissions to each user, which can become unwieldy in a system with an excess of users. In a more current approach called role-based access organize, permissions are allocated to position, and users are assigned to roles.


Related Discussions:- Acl-based security model

Discuss marxs concept of alienation, Question 1: The process of alienat...

Question 1: The process of alienation is broken down into four conceptually discrete but related spheres. Discuss Marx's concept of alienation. Give examples from the lab

Differentiation;simulation in Berkeley Madonna, I would like to know if I c...

I would like to know if I can get help with differentiation of equations, and how to write equations in Berkeley Madonna (the second is not so important)?

New media communication technologies, New Media Communication Technologies:...

New Media Communication Technologies: Here are some contemporary New Media communication technologies that are a mix of mass communication and interpersonal communication. Que

Explain the concepts of the expectancy theory, QUESTION 1 Compare writt...

QUESTION 1 Compare written and telephonic communication in terms of their media richness QUESTION 2 Identify the communication directions relevant to the following chan

Egg, What is the type of egg in which yolk is absent?

What is the type of egg in which yolk is absent?

Adolescence and family education, you being a teacher describe your experie...

you being a teacher describe your experiences regarding the role of school, parent and peers in imparting family life education.

State of the union code, 1)  The average number of sentences per word over ...

1)  The average number of sentences per word over time Do this two ways: First, using a simple regex that splits on puntuation. Second, using the natural language toolkit's se

World geography, what is the relationship between physical and human charac...

what is the relationship between physical and human characteristics of a place

Security related to credit cards, Security Credit card safety relies on...

Security Credit card safety relies on the physical safety of the plastic card in addition to the privacy of the credit card number. Consequently, whenever a person other than t

Definitions, what does the word approximate number mean?

what does the word approximate number mean?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd