Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies 2001
DOI: 10.1145/373256.373271
|View full text |Cite
|
Sign up to set email alerts
|

Improving the granularity of access control in Windows NT

Abstract: This paper presents the access control mechanisms in Windows 2000 that enable fine-grained protection and centralized management. These mechanisms were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000. We first extended entries in access control lists to allow rights to apply to just a portion of an object. The second extension allows centralized management of object hierarchies by specifying more precisely how access control lists are inherited. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
1

Year Published

2002
2002
2014
2014

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 9 publications
0
9
0
1
Order By: Relevance
“…Although Windows has a richer access control model than Linux users and groups [42], Windows adopts similar practices for some resources, such as requiring Administrator privilege to create a raw socket [34].…”
Section: Related Workmentioning
confidence: 99%
“…Although Windows has a richer access control model than Linux users and groups [42], Windows adopts similar practices for some resources, such as requiring Administrator privilege to create a raw socket [34].…”
Section: Related Workmentioning
confidence: 99%
“…One is that resources that are protected in filesystems are different, and have different relationships with one another than in VCSes. The second is that typically, such schemes, such as the ones in POSIX-compliant systems [27] and Windows ACLs [29,30], have only two levels of administrators: a superuser ("root") and the owner of a file or directory. The owner has full discretion in handing out rights to resources that he owns.…”
Section: Related Workmentioning
confidence: 99%
“…Many authors, including some of the present ones, have proposed authentication schemes that try to support a more complex notion of principal than merely "the logged-in user" [6,16,29,33]. Most commonly, such schemes allow a principal to adopt a "role" or "restricted context" with the intention of reducing or enhancing the principal's privileges.…”
Section: Related Workmentioning
confidence: 99%