Question

In: Computer Science

in ACL (access control List) : 1.How do you determine who can access object x? 2....

in ACL (access control List) : 1.How do you determine who can access object x? 2. How do you determine which objects user y can access? 3. What happens if a file is deleted?

Solutions

Expert Solution

In the Access Control List (ACL),

1) How it is determined who can access object x:
The privileges or permissions determine specific access rights, such as if a user is allowed to read from, write to, or execute object x. ACL also goes through a list of permissions attached to the object. It specifies which users or system processes are granted access to objects. A typical ACL would have entries, where each entry specifies a subject and an operation. There is a mapping of subjects (users or processes) to a certain set of operations performed on specific pre-determined objects (files, processes; functions, variables that are within a program, and system resources such as servers, printers, etc.). It determines who has access to object x, or specific files, or other system resources in general.

As a process, a subject sends a request to access an object. The subject sends this request to a reference monitor which is implemented by security kernel, Trusted Computing Base (TCB). All access to objects is mediated by or goes through the TCB. Reference monitor checks the mapping of subject to the operations it can perform on a specific object, say, x, ensuring if it is allowed or denied or simply authorized to perform the requested operation based on prior approval, and later based on its setup or configuration.

Also, an authentication mechanism is also required to determine who could access object x, determining if a user is allowed to access the system at all in the first place.

2) How it is determined which objects user y can access:
Each object comes with a security attribute of its own identifying its ACL. This list has an entry for each system user (subject), say, y, with access privileges.

Each ACL has one or more Access Control Entries (ACEs) consisting of the name of a user, say, y. For each of these users, the access privileges are defined in a string of bits called an access mask. A system administrator or the object owner creates the access control list for an object and defines the objects, subjects, objects' access to these subjects, and the type of access. Also, each object is associated with a security attribute identifying its ACL. The ACL model is applicable to both, individual entities and the collection of objects. The ACL has one list per object showing all subjects with access and their rights.

3) What happens if a file is deleted:
When a file or an object is deleted, its associated or discretionary control access list is also deleted.


Related Solutions

You can use up to three levels of security and protection to control who can access...
You can use up to three levels of security and protection to control who can access and change your Excel data. Please describe two of the three levels and how you access each of them.
How can you determine the type of charge on an object using an electroscope that has...
How can you determine the type of charge on an object using an electroscope that has a net charge of unknown sign? Explain in connection with Triboelectric Series.
How do the IEEE 802.1x standards improve network access control?
How do the IEEE 802.1x standards improve network access control?
How do you show that the function "f(x) = {[x-1;x<2], [2x-3;x>=2]}" is not differentiable at "x=2”?
How do you show that the function "f(x) = {[x-1;x<2], [2x-3;x>=2]}" is not differentiable at "x=2”?
QBO 1 How do you access Company Settings? 2 When is it appropriate to add beginning...
QBO 1 How do you access Company Settings? 2 When is it appropriate to add beginning balances to accounts? 3 What steps need to be followed to add an account to the chart of accounts? 4 When you add a beginning balance to an account, what other account is affected? 5 What information is required when adding a new product to QBO? 6 What additional information is required when you add beginning balance amounts to the accounts receivable account? 7...
Describe the difference between authentication and access control. How do each of these concepts support the...
Describe the difference between authentication and access control. How do each of these concepts support the confidentiality and integrity of the data they protect? How does the “principle of least privilege” increase this support on the access control side? Describe how multi-factor authentication increases the confidence that someone is who they claim to be (i.e. that the person logging in is actually that person.)
Radioactive decay can be used to determine the age of an object. If you know the...
Radioactive decay can be used to determine the age of an object. If you know the number of radioactive nuclei with which an object started, the number of radioactive nuclei currently present, and the half-life of the isotope, you can calculate the time since the object was created. Suppose an object was created with 4.810×109 nuclei of a particular isotope that has a half-life of 1.56×103 yr. At this point in time 9.620×108 nuclei of this particular isotope remain. What...
1) How do we know that an object performs a simple harmonic motion? 2) Is the...
1) How do we know that an object performs a simple harmonic motion? 2) Is the movement of a pendulum a simple harmonic movement? Explain 3) Are there other types of pendulums that perform a MAS? Explain each
How do you determine the blood type of the patient? Is there a donor who could...
How do you determine the blood type of the patient? Is there a donor who could give the blood to the patient? And why?
how do you access the icf crosswalk database?
how do you access the icf crosswalk database?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT