Global Information Lookup Global Information

Discretionary access control information


In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria[1] (TCSEC) as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control).

Discretionary access control is commonly discussed in contrast to mandatory access control (MAC). Occasionally, a system as a whole is said to have "discretionary" or "purely discretionary" access control when that system lacks mandatory access control. On the other hand, systems can implement both MAC and DAC simultaneously, where DAC refers to one category of access controls that subjects can transfer among each other, and MAC refers to a second category of access controls that imposes constraints upon the first.

  1. ^ Trusted Computer System Evaluation Criteria. United States Department of Defense. December 1985. DoD Standard 5200.28-STD. Archived from the original on 2006-05-27.

and 22 Related for: Discretionary access control information

Request time (Page generated in 1.0555 seconds.)

Discretionary access control

Last Update:

In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria (TCSEC)...

Word Count : 563

Computer access control

Last Update:

implemented differently in systems based on discretionary access control (DAC) and mandatory access control (MAC). Identification and authentication (I&A)...

Word Count : 2529

Access control

Last Update:

and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the...

Word Count : 6064

Mandatory access control

Last Update:

policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the...

Word Count : 2553

Principle of least privilege

Last Update:

context of distribution of discretionary access control (DAC) permissions, for example asserting that giving user U read/write access to file F violates least...

Word Count : 1811

AppArmor

Last Update:

AppArmor supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been partially included...

Word Count : 966

Extended file attributes

Last Update:

or a checksum, cryptographic hash or digital certificate, and discretionary access control information. In Unix-like systems, extended attributes are usually...

Word Count : 1740

Type enforcement

Last Update:

access control (MAC) over discretionary access control (DAC). Access clearance is first given to a subject (e.g. process) accessing objects (e.g. files, records...

Word Count : 610

Security descriptor

Last Update:

descriptors contain discretionary access control lists (DACLs) that contain access control entries (ACEs) that grant and deny access to trustees such as...

Word Count : 743

Computer security model

Last Update:

Relationship-based access control (ReBAC) Role-based access control (RBAC) Take-grant protection model Discretionary access control (DAC) Security modes Protection mechanism...

Word Count : 184

Information security

Last Update:

to access control, or it may be derived from a combination of the three approaches. The non-discretionary approach consolidates all access control under...

Word Count : 22104

Biba Model

Last Update:

Systems's XTS-400 operating system. Discretionary Access Control – DAC Graham–Denning model Mandatory Access Control – MAC Multilevel security – MLS Security-Enhanced...

Word Count : 577

System File Checker

Last Update:

Resource Protection (WRP) works by setting discretionary access-control lists (DACLs) and access control lists (ACLs) defined for protected resources...

Word Count : 1224

List of computing and IT abbreviations

Last Update:

DAC—Discretionary Access Control DAL—Database Abstraction Layer DAO—Data Access Object DAO—Data Access Objects DAO—Disk-At-Once DAP—Directory Access Protocol...

Word Count : 6615

Access control expression

Last Update:

performance. Cacls Capability-based security Discretionary access control Role-based access control "Syntax of Access Control Expressions". MapR Documentation. Retrieved...

Word Count : 373

Security modes

Last Update:

formal access approval Access control Multifactor authentication Bell–LaPadula model Biba model Clark-Wilson model Discretionary access control (DAC) Graham-Denning...

Word Count : 383

Trusted Computer System Evaluation Criteria

Last Update:

store and preserve the integrity of access control labels and retain the labels if the object is exported. Discretionary Security Policy – Enforces a consistent...

Word Count : 2101

Need to know

Last Update:

used. — Richard Feynman, Surely You're Joking, Mr. Feynman! The discretionary access control mechanisms of some operating systems can be used to enforce need...

Word Count : 732

Security Identifier

Last Update:

new SIDs. Access control Access Control Matrix Discretionary Access Control (DAC) Globally Unique Identifier (GUID) Mandatory Access Control (MAC) Role-Based...

Word Count : 1411

Netfilter

Last Update:

called following the call of the filter table, allowing any Discretionary Access Control (DAC) rules in the filter table to take effect before any MAC...

Word Count : 2724

DAC

Last Update:

from air Direct Attach Copper, a 10 Gigabit Ethernet connector Discretionary access control, in computer security Double-acting Cylinder, a type of pneumatic...

Word Count : 510

Network File System

Last Update:

Delegation and Notifications Multi-server Namespace access control lists and discretionary access control Retention Attributions SECINFO_NO_NAME 9P (protocol)...

Word Count : 2714

PDF Search Engine © AllGlobal.net