2002
DOI: 10.1145/581271.581273
|View full text |Cite
|
Sign up to set email alerts
|

Improving the granularity of access control for Windows 2000

Abstract: ________________________________________________________________________This paper presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed access control for both operating system components and applications. These features were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000, and to protect computers connected to the Internet. While the access control mechanisms in Windows NT are suitable for file systems and applica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2003
2003
2011
2011

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…One is that resources that are protected in filesystems are different, and have different relationships with one another than in VCSes. The second is that typically, such schemes, such as the ones in POSIX-compliant systems [27] and Windows ACLs [29,30], have only two levels of administrators: a superuser ("root") and the owner of a file or directory. The owner has full discretion in handing out rights to resources that he owns.…”
Section: Related Workmentioning
confidence: 99%
“…One is that resources that are protected in filesystems are different, and have different relationships with one another than in VCSes. The second is that typically, such schemes, such as the ones in POSIX-compliant systems [27] and Windows ACLs [29,30], have only two levels of administrators: a superuser ("root") and the owner of a file or directory. The owner has full discretion in handing out rights to resources that he owns.…”
Section: Related Workmentioning
confidence: 99%
“…Sun's J2EE [28] uses the RBAC pattern in the authorization service (e.g., password management systems in UNIX and Windows) for E-Commerce applications [29]. Solaris 8 uses the RBAC pattern to restrict access to tools and utilities.…”
Section: Known Usesmentioning
confidence: 99%
“…CORBA Security also uses the notion of permission groups, called rights families, to extend the number of permissions [Karjoth 2000]. A different approach is used in Windows 2000, where the object type field of an ACL entry specifies to which portion of an object it refers [Swift et al 2002].…”
Section: Access Control Listsmentioning
confidence: 99%