Fact-checked by Grok 2 weeks ago

Access-control list

An access control list (ACL) is a used in systems to enforce by specifying the permissions granted to specific principals, such as users, groups, or processes, for accessing a protected like a , , or network interface. It consists of one or more access control entries (ACEs), where each entry identifies a principal and the operations they are allowed or denied, such as read, write, execute, or traverse. ACLs implement (DAC) policies, allowing owners to define who can access their objects, in contrast to (MAC) which relies on system-wide labels. The concept of ACLs originated in the Multics operating system during the 1960s, developed by MIT's Project MAC in collaboration with Bell Laboratories and , as a core component of its protection mechanisms to secure shared segments and directories. In , an ACL was attached to each object and listed user identifiers along with permitted access modes, using wildcards for efficient matching and ordered evaluation to determine effective permissions. This design influenced subsequent systems, including operating systems that extended traditional permissions with extended ACLs for finer-grained control, and Windows , which uses security descriptors containing discretionary ACLs (DACLs) and system ACLs (SACLs) for auditing. In networking, ACLs serve as packet filters on routers and firewalls, permitting or denying traffic based on criteria like source/destination IP addresses, ports, or protocols, as standardized in protocols from the (IETF). Modern applications extend to , databases, and distributed systems, where ACLs enable (RBAC) hybrids by associating permissions with groups or roles, though they can introduce management overhead in large-scale environments due to the need to update lists per resource. Despite alternatives like capability-based systems, ACLs remain prevalent for their flexibility in enforcing the principle of least privilege and supporting compliance with standards such as those from the National Institute of Standards and Technology (NIST).

Fundamentals

Definition and Purpose

An (ACL) is a mechanism that implements for a by enumerating the identities of the system entities permitted to it, typically in the form of a list of access control entries (ACEs) that specify permissions for users, groups, or processes on protected objects such as files, network resources, or database records. The primary purpose of an ACL is to enforce (DAC), allowing resource owners to define and modify permissions—such as read, write, execute, or deny—for specific principals, thereby enabling fine-grained regulation of access rights based on user-specified rules. In this model, the creator or owner of the object retains the discretion to grant or revoke access, distinguishing ACLs from more rigid policy enforcement schemes. ACLs are essential for protecting sensitive in multi-user environments, including operating systems, , and applications, where they prevent unauthorized access by explicitly listing allowed interactions and thereby mitigate risks of data breaches or misuse in shared systems. As a foundational component of DAC systems, ACLs also serve as building blocks in hybrid security architectures that incorporate elements of (MAC), where centralized policies complement discretionary lists to enhance overall protection without solely relying on user discretion.

Historical Development

Access control lists (ACLs) originated in the mid-1960s as part of the operating system, a collaborative project between MIT's Project MAC, Bell Telephone Laboratories, and General Electric's Large Computer Product Department, with design work beginning in 1965. integrated ACLs from its inception to manage protection for its , where each segment (a basic unit of storage) was associated with an ACL specifying access rights for users or groups, such as read, write, or execute permissions. This design, detailed in a 1974 Communications of the ACM paper by Jerome H. Saltzer, drew conceptual influence from early protection models, including Butler Lampson's work on access matrices during his involvement in from 1965 to 1973. The system's emphasis on flexible, list-based authorization influenced subsequent operating systems, including those from and (DEC), which adopted similar mechanisms in their mainframe and environments by the early 1970s. In the , concepts began appearing in extensions to systems, moving beyond the original UNIX model's simple owner-group-other permissions introduced in the early . Early implementations, such as those in variants and proprietary UNIX derivatives, added support for finer-grained file protection, though widespread adoption awaited further standardization efforts. By the , the working group, formed under IEEE in 1984 to standardize UNIX interfaces, included ACLs in draft extensions like POSIX.1e, aiming to provide a portable model with , default, and mask entries for filesystems. These drafts, evolving through the late , influenced implementations in systems like and AIX, despite the final POSIX.1e withdrawal in 1997 due to implementation complexities. The 1990s marked the expansion of ACLs into networking, particularly with IP access control lists in routers, where standard ACLs for traffic filtering were introduced as early as IOS Software Release 8.3 around 1990. This enabled packet-level security in enterprise networks, building on earlier filtering concepts but standardizing list-based rules for source/destination IP matching. Simultaneously, incorporated ACLs into starting with version 3.1 in 1993, drawing from heritage to support with security descriptors on objects like files. By the 2000s, ACL evolution emphasized advanced features like and auditing to address scalability in distributed environments. Windows NT's successor, (released 2000), enhanced ACLs with richer models for Active Directory-integrated systems. Similarly, the IETF standardized NFSv4 ACLs in RFC 3530 (April 2003), introducing Windows-compatible entries with allow/deny, audit, and alarm types, plus flags, to unify across heterogeneous networks beyond traditional UNIX modes. These developments, driven by needs for cross-platform , solidified ACLs as a cornerstone of modern operating and .

Core Concepts

Structure of ACL Entries

An access control list (ACL) is fundamentally a collection of access control entries (ACEs) that define permissions for protected resources, typically organized as either an ordered or unordered list depending on the implementation. Each ACE specifies the conditions under which access is granted, denied, or audited for a particular entity, ensuring granular control over operations like reading, writing, or executing. In standard models, the list is evaluated against a subject's request to determine allowable actions. Implementations vary: for example, Windows uses bitwise access masks, while systems use symbolic permission sets. The core components of an ACE include the trustee, also known as the principal or (SID), which identifies the , group, or entity affected by the entry—such as a user ID or group SID. Another essential element is the access mask or permission set, which represents the allowed operations; in systems like Windows, this is a bitwise value where specific bits correspond to rights like read (often 0x1 for FILE_READ_DATA), write (0x2 for FILE_WRITE_DATA), or execute (0x10 for FILE_EXECUTE), allowing combinations such as 0x13 for read|write|execute. The ACE type denotes whether the entry allows or denies access in systems that support explicit denies (e.g., Windows); POSIX systems lack deny types and instead deny by absence of permissions. Auditing, where supported (e.g., in Windows system ACLs or SACLs), may log success or failure. Additional flags in an ACE often govern in hierarchical systems, determining if permissions propagate to child objects, such as from a directory to its files; common flags in Windows include container inherit (for subdirectories) and object inherit (for files), enabling hierarchical policy application without redundant entries. In POSIX-compliant systems, is handled via separate default ACLs rather than per-ACE flags, and ACEs are categorized by type—such as user_obj for the owner, group for specific groups, or for effective permissions—each with a qualifier (e.g., UID or GID) and a permission set limited to read (r), write (w), and execute/search (x). Variations across ACL models include explicit entries, which are directly assigned to the , versus inherited ones derived from parent objects, reducing administrative overhead in tree-structured environments. Advanced ACLs may incorporate wildcards for trustees (e.g., matching multiple users) or conditional clauses based on attributes like time or location, though these extend beyond basic structures into hybrid models. For illustration, a typical in might appear as: {trustee: "user1", mask: 0x13 (read|write|execute), type: allow, inherit: container|object} (Windows example).

Permission Evaluation Process

The permission evaluation process for an access control list (ACL) determines whether a , such as a or , can perform a requested on a protected object, like a file or network resource, by systematically analyzing the ACL's entries against the subject's identity. This process begins by extracting the subject's security attributes—typically including user identifiers, group memberships, or security identifiers (SIDs)—and comparing them to the principals specified in each access control entry (ACE) within the object's ACL. Matching occurs if the subject aligns with the ACE's trustee, such as an exact user match or membership in a designated group. Evaluation algorithms vary by implementation: Windows uses ordered scanning with deny precedence, while follows a fixed sequence to compute effective permissions. In systems supporting explicit denies (e.g., Windows NTFS), the algorithm employs short-circuit evaluation prioritizing denies over allows: the system scans ACEs in their defined order, immediately denying access upon encountering a matching explicit deny ACE that covers the requested permission, without further processing. Absent any deny, it proceeds to accumulate permissions from all matching allow ACEs, granting access only if the combined (typically bitwise OR) effective permissions encompass the full requested operation; otherwise, an implicit deny applies at the end. This deny-precedence model prevents unintended access, as a single deny overrides any number of allows. In contrast, POSIX systems (e.g., Linux extended ACLs) lack explicit denies and instead evaluate in a specific order—checking owner, named users (ANDed with mask), groups (ANDed with mask), and other—granting access if the effective permissions include the request, denying otherwise. In hierarchical structures, such as filesystems or directories, evaluation incorporates by first consulting the target object's ; if entries are absent or incomplete (e.g., due to non-inherited permissions), the process traverses upward to objects to apply inherited or default ACLs, propagating permissions downward as needed for child objects. Default ACLs serve as templates for newly created objects, ensuring baseline protections when no explicit entries exist for a subject (common in ). Conflicts between ACEs are resolved via implementation-specific rules, such as explicit deny override in Windows or mask application in ; some models use first-match semantics (common in network ACLs), while others (prevalent in filesystem ACLs) aggregate relevant ACEs before deciding, with denies prevailing where supported. For instance, in cumulative systems like Windows, multiple allow ACEs bitwise combine, but any intersecting deny nullifies the result. Edge cases include , where dedicated audit ACEs (in systems like Windows) log successful or failed attempts without altering the allow/deny outcome, enabling . Performance optimizations, such as caching resolved access tokens or pre-evaluated effective permissions, mitigate overhead from frequent , particularly in high-volume environments.

System Implementations

Filesystem ACLs

Filesystem access control lists (ACLs) extend the traditional UNIX permission model, which categorizes access rights into owner, group, and other categories, by allowing fine-grained permissions for multiple users and groups on individual files and directories. This enables more precise control over who can read, write, or execute resources, addressing limitations in the basic model where permissions apply broadly without per-user granularity. ACLs are particularly useful in multi-user environments, such as shared servers, where diverse access needs must be balanced with security. POSIX ACLs, as defined in the draft standard from 1997, provide a standardized framework for implementing ACLs on systems. These ACLs consist of entries specifying permissions for specific users (user ACLs), groups (group ACLs), and a mask that limits the effective permissions of additional entries to ensure compatibility with traditional UNIX modes. In , POSIX ACLs have been implemented in filesystems like , , and since kernel versions around 2002, allowing administrators to manage them using commands such as getfacl for viewing ACLs and setfacl for modifying them. For example, a command like setfacl -m u:alice:rw file.txt grants read and write access to user Alice on file.txt, with the mask ensuring that the effective permissions do not exceed the file's owner/group/other settings. NFSv4 ACLs, standardized in RFC 3530 published in 2003, introduce a richer model compatible with Windows NT-style ACLs, facilitating between UNIX and Windows environments in networked file systems. Unlike ACLs, NFSv4 ACLs support inheritance flags that propagate permissions to child directories and files, such as INHERIT_ONLY, FILE_INHERIT, and DIRECTORY_INHERIT, allowing policies like automatic permission application during file creation. These ACLs define allow and deny entries with detailed rights (e.g., read_data, write_data, execute), audited via tools integrated into NFS clients and servers. Implementations appear in systems like Linux's NFSv4 support since kernel 2.6.15 and , enabling cross-platform sharing without permission mismatches. Operationally, filesystem ACLs incorporate modes to manage permissions dynamically, such as NFSv4 flags like FILE_INHERIT and DIRECTORY_INHERIT to to objects. This ensures controlled in hierarchical structures. Additionally, ACLs integrate with the chmod command for ; changes via chmod update the base permissions and mask, automatically adjusting ACL effective rights without disrupting existing entries. Such mechanisms maintain usability in legacy environments while providing enhanced security.

Networking ACLs

In networking, access control lists (ACLs) are mechanisms implemented in routers, switches, and firewalls to filter and control packet traffic based on criteria such as source or destination addresses, protocols, and ports. These ACLs enhance by permitting or denying packets at the network layer, preventing unauthorized access and mitigating threats like denial-of-service attacks. Primarily associated with and similar vendor platforms, networking ACLs operate statelessly, evaluating each packet independently against a sequential list of rules without maintaining connection state. Networking ACLs are categorized into standard and extended types. Standard ACLs filter traffic solely based on the source , using numbered ranges 1–99 or 1300–1999 for identification; for example, the rule access-list 10 permit 192.168.1.0 0.0.0.255 allows all traffic from the 192.168.1.0/24 . Extended ACLs provide more granular control by considering both source and destination , protocols (e.g., , , ICMP), and port numbers, identified by ranges 100–199 or 2000–2699; an example is access-list 101 permit tcp any host 10.0.0.1 eq [80](/page/80), which permits traffic from any source to the destination 10.0.0.1 on (HTTP). These types enable administrators to enforce policies such as blocking specific or allowing only certain services. ACLs are applied to router or switch in inbound or outbound directions to inspect entering or leaving the device. For instance, an inbound ACL on a filters packets arriving from external networks before they propagate internally, while an outbound ACL controls exiting toward the . A critical feature is the implicit deny rule at the end of every ACL, which denies all unmatched packets by default, ensuring comprehensive control unless explicitly permitted. The evolution of networking ACLs began in the late 1980s with the introduction of IP ACLs in early routers, coinciding with the development of TCP/IP routing capabilities following the company's founding in and first product shipment in 1986. Over time, enhancements addressed limitations in static filtering for dynamic environments; reflexive ACLs, introduced in Software Release 11.3 (1996), dynamically create temporary entries to permit return traffic for outbound sessions, improving security for protocols like FTP without manual configuration. Time-based ACLs, added in Release 12.0.1.T (2000), allow rules to activate or deactivate based on scheduled time ranges, such as restricting access during off-hours when synchronized with NTP. These extensions have made ACLs adaptable to modern, time-sensitive, and session-oriented network demands while maintaining their foundational role in traffic filtering.

Directory and Database ACLs

In directory services, Microsoft , introduced with , employs discretionary lists (DACLs) and system lists (SACLs) to manage permissions on directory objects such as users, groups, and organizational units (OUs). DACLs define the trustees granted or denied to securable objects, ensuring that only authorized principals can perform operations like reading or modifying attributes. SACLs, in contrast, specify conditions under which attempts trigger audit events, supporting compliance and security monitoring without directly controlling . Permissions in Active Directory support schema-based for OUs, where entries (ACEs) propagate downward through the object , allowing centralized administration while applying context-specific overrides at child levels. Lightweight Directory Access Protocol (LDAP) directories implement access control through Access Control Information (ACIs) or similar mechanisms that evaluate permissions based on entry attributes, distinguished names, and hierarchical structure, allowing inheritance from parent entries. For instance, permissions can be defined to apply to specific object classes or attributes unless explicitly blocked, as supported in various LDAP server implementations to reduce administrative overhead. Relational databases implement ACL-like mechanisms to enforce granular access at the row and object levels, adapting directory principles to structured data environments. In , row-level security (RLS), introduced in SQL Server 2016, restricts row visibility based on user attributes or execution context, often combined with SQL GRANT statements for broader permissions, such as GRANT SELECT ON [table](/page/Table) TO user, which function similarly to ACL entries by assigning specific rights to principals. Oracle Database's Real Application Security uses dedicated ACLs to associate application privileges with data realms, enabling row- and column-level constraints where an ACL grants or denies operations like SELECT or UPDATE on protected subsets of data. applies ACLs directly to relations (s, views, and sequences), with each entry in the ACL listing permissions—such as SELECT, INSERT, or ALL—granted by a specific grantor to a grantee, stored as aclitem structures for efficient evaluation during query execution. A core strength of these ACL implementations lies in their integration of auditing and delegation capabilities, which enhance manageability in large-scale environments. Auditing in directory services, exemplified by 's SACLs, logs events like object access or modifications when matching criteria are met, generating records in the Windows Security log for forensic analysis. Delegation models further refine control by allowing administrators to parcel out sub-rights, such as read-only access to user attributes or reset password privileges, via tools like the Delegation of Control wizard in , thereby minimizing risks while distributing administrative duties.

Comparisons with Other Models

Role-Based Access Control

(RBAC) is an access control model in which users are assigned to roles, permissions to those roles, and users acquire permissions through their role memberships, enabling many-to-many relationships between users and permissions. This approach, formalized in the ANSI INCITS 359-2004 standard, contrasts with traditional (ACLs), where permissions are explicitly assigned to individual users or groups directly on each protected object. In RBAC, access decisions are mediated by roles rather than per-object principal lists, centralizing permission management; for instance, an "admin" role might grant write access across multiple resources without listing each user on every ACL. Key differences from ACLs include RBAC's support for role hierarchies, where senior roles inherit permissions from junior ones, and constraints such as to prevent conflicts, like static rules barring a from multiple incompatible roles or dynamic limits on active roles per session. These features reduce the need for lengthy per-object lists in ACLs, which can grow unwieldy as users and objects scale. RBAC centralizes administration by tying permissions to reusable roles, whereas ACLs require direct updates to each object's list for changes in user access. In large-scale environments, RBAC offers advantages over ACLs by simplifying and lowering costs; for example, it can reduce time for assignments by over 5 minutes per task, yielding annual savings of hundreds of thousands of dollars in organizations with 100,000 employees. This scalability stems from managing roles centrally rather than decentralizing permissions across objects, making RBAC more efficient for enterprise-wide policy enforcement. Conversely, ACLs excel in scenarios requiring fine-grained, object-specific controls where role-based generalizations might be too coarse. Hybrid approaches often combine RBAC with ACLs to leverage both strengths, such as using roles to populate the trustees in ACL entries for broader management while retaining per-object granularity. This integration allows RBAC to handle high-level assignments and ACLs to enforce precise exceptions, enhancing flexibility in complex systems.

Attribute-Based Access Control

(ABAC) is a dynamic model that determines access to by evaluating attributes of the (), object (), , and (such as time, , or type) against predefined policies. These policies define rules that combine attributes to grant or deny access, enabling fine-grained and context-aware decisions without relying on fixed user-resource mappings. The eXtensible Access Control Markup Language (), first standardized by OASIS in , serves as a key policy language for expressing and processing ABAC rules, including components like policy decision points for evaluation and enforcement points for application. Unlike Access Control Lists (ACLs), which use rigid, static lists of principals and permissions directly associated with resources, ABAC leverages languages to encode complex, conditional logic for greater expressiveness. For instance, an ABAC could permit access to a confidential only if the subject's department attribute equals "," the action is "read," and the environmental attribute for time is before 18:00. This flexibility allows ABAC to adapt to varying contexts, but it introduces higher computational demands through repeated attribute gathering and evaluation at runtime, contrasting with ACLs' efficient direct lookups. ABAC is well-suited for distributed systems like environments and , where attributes from multiple sources enable scalable, policy-centric enforcement across services. ACLs, by comparison, excel in simpler, performance-critical settings such as local , where quick resolution of predefined entries is prioritized over dynamic rules. ABAC emerged as an evolution of ACL and (RBAC) models, addressing their limitations in handling complex, dynamic scenarios by incorporating broader attribute sets for policy definition. It has become prominent in zero-trust architectures since the , supporting principles like continuous verification and least through attribute-driven decisions that verify access at every request.

Advantages and Limitations

Key Benefits

Access control lists (ACLs) provide a high degree of in managing permissions, allowing administrators to define precise access rights for individual users, groups, or entities on specific objects such as files, directories, or network resources. This enables scenarios like granting read-only access to auditors while permitting full modification rights to project owners on the same dataset, surpassing the limitations of traditional owner-group-others permission models. In small-scale discretionary access control (DAC) environments, ACLs offer simplicity by directly associating permissions with object owners, facilitating straightforward implementation and maintenance without complex policy hierarchies. This approach supports easy auditing, as tools like getfacl and setfacl allow quick inspection and verification of who has access to what, reducing administrative overhead in environments with limited users or resources. ACLs exhibit strong interoperability across diverse operating systems and protocols, with widespread support in Windows via and , as well as in Linux through and NFSv4 implementations. This compatibility extends to file-sharing protocols like NFS and , enabling seamless permission translation between Windows and Unix-like systems without significant reconfiguration. For performance, ACL evaluation typically involves efficient sequential processing of access control entries (ACEs), imposing low overhead in local systems where access checks occur directly on the resource without extensive network traversal or policy computation. This design ensures quick grant or deny decisions for most operations, making ACLs suitable for high-throughput environments like file servers.

Common Challenges

One significant challenge in implementing access control lists (ACLs) is , particularly the phenomenon known as "ACL explosion," where the number of entries proliferates in large-scale systems with numerous users, objects, and permissions, resulting in excessive overhead and performance degradation. This issue arises as organizations grow, leading to unwieldy lists that are difficult to maintain and evaluate efficiently, often requiring automated techniques to reduce entry counts multiplicatively. In networking environments, for instance, ACLs can expand rapidly due to granular rules for traffic filtering, straining router and switch resources. Security risks associated with ACLs frequently stem from misconfigurations, such as overly permissive rules that inadvertently grant unauthorized access or explicit denies that block legitimate traffic. For example, improper setup of permissions on shared resources like network drives can expose sensitive data to unauthorized users, as often these less-restricted areas. Inheritance bugs further compound these risks, where hierarchical permission propagation in filesystems or directories leads to unintended access escalations, such as a object inheriting overly broad rights from a . These errors can facilitate , allowing insiders or external threats to bypass intended controls. Maintenance of ACLs presents ongoing difficulties, including the challenge of auditing extensive lists to detect anomalies or outdated entries, which becomes labor-intensive without automated tools. Long ACLs obscure visibility into permission structures, increasing vulnerability to insider threats if access events are not paired with comprehensive and mechanisms. Without regular validation, these lists can accumulate redundant or conflicting rules, heightening the risk of non-compliance with security policies. To mitigate these challenges, organizations should adopt best practices such as conducting periodic reviews of entries to remove redundancies and ensure alignment with current needs. Utilizing tools like minimizers or analyzers can automate optimization, compressing lists while preserving functionality. Integrating with least-privilege principles—restricting to the minimum required for tasks—further enhances , supported by automated enforcement mechanisms to handle dynamic environments. Enforcing strict of access attempts and combining with role-based oversight also aids in detecting and responding to potential abuses.

References

  1. [1]
    access control list - Glossary | CSRC
    A mechanism that implements access control for a system resource by enumerating the identities of the system entities that are permitted to access the resources ...
  2. [2]
    [PDF] A Survey of Access Control Policies - UMD Computer Science
    Apr 16, 2011 · The three main types of access control policies are discretionary, mandatory, and role-based. Discretionary policies are based on object rights ...
  3. [3]
    MDD-002 Multics Security Model -- Bell and La Padula - MIT
    An ACL for an object is a list of user ID's that may access the object and which Multics access modes, read or write for example, that that subject has to the ...
  4. [4]
    [PDF] Access Control and Operating System Security
    Access control lists are widely used, often with groups. Some aspects of capability concept are used in Kerberos, … Capabilities. ◇Operating system concept. • “ ...<|control11|><|separator|>
  5. [5]
    The Protection of Information in Computer Systems
    ### Summary of Access Control Lists (ACLs) from https://web.mit.edu/Saltzer/www/publications/protection/
  6. [6]
    Discretionary Access Control - CS@Cornell
    A discretionary access control (DAC) policy is a means of assigning access rights based on rules specified by users.
  7. [7]
  8. [8]
    Access Control - CS@Cornell
    An implementation that stores by columns is commonly known as an access control list (ACL).Missing: definition | Show results with:definition
  9. [9]
    [PDF] General Access Control Guidance for Cloud Systems
    Access control (AC) dictates how subjects (i.e., users and processes) can access objects based on defined AC policies to protect sensitive data and critical ...
  10. [10]
    [PDF] Principles and Practice 1 Access Control and Other Security Services
    Access control lists have been a popular approach for implementing the access matrix model in computer operating systems. Some systems approximate ACLs by ...Missing: types | Show results with:types<|control11|><|separator|>
  11. [11]
    [PDF] Computer Security CS 426 - Purdue Computer Science
    ACCESS CONTROL LISTS (ACL ). ACCESS CONTROL LISTS (ACLs). F. G. U:r. U:w. U:r. V:r ... • Mandatory access controls (MAC) restrict y. (. ) the access of subjects ...
  12. [12]
    History - Multics
    Jul 31, 2025 · Multics design was started in 1965 as a joint project by MIT's Project MAC, Bell Telephone Laboratories, and General Electric Company's Large ...
  13. [13]
    [PDF] Protection and the Control of Information Sharing in Multics
    ~The Multics access control list corresponds roughly to a column of Lampson's protection matrix [19]. The third partition has not yet been completely ...
  14. [14]
    POSIX Access Control Lists on Linux - USENIX
    This paper discusses file system Access Control Lists as implemented in several UNIX-like operating systems.Missing: history | Show results with:history
  15. [15]
    Configure IP Access Lists - Cisco
    Standard ACLs are the oldest type of ACL. They date back to as early as Cisco IOS Software Release 8.3. Standard ACLs control traffic by the comparison of the ...
  16. [16]
    Access Control Lists - Win32 apps - Microsoft Learn
    Jul 9, 2025 · An access control list (ACL) is a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied ...Missing: history | Show results with:history
  17. [17]
    RFC 3530 - Network File System (NFS) version 4 Protocol
    RFC 3530 is a proposed standard for the Network File System (NFS) version 4 Protocol, which is obsoleted by RFC 7530.
  18. [18]
    acl(5) - Linux manual page - man7.org
    This manual page describes POSIX Access Control Lists, which are used to define more fine-grained discretionary access rights for files and directories.Acl Entries Top · Acl Text Forms Top · See Also Top
  19. [19]
    11 Access Control Lists in Linux - SUSE Documentation
    POSIX ACLs (access control lists) can be used as an expansion of the traditional permission concept for file system objects.
  20. [20]
    [PDF] Access Control Lists in Linux & Windows
    • getfacl: Check the current state of ACL on file/directory. getfacl ... Access Check Algorithm. • Subject's access request to object –. Step 1: Select ...
  21. [21]
    Order of ACEs in a DACL - Win32 apps | Microsoft Learn
    Jan 7, 2021 · The preferred order provides a simple framework that ensures that an access-denied ACE actually denies access.Missing: evaluation | Show results with:evaluation
  22. [22]
  23. [23]
    [PDF] Assessment of Access Control Systems
    To determine the read, write, and execute access, the access check is performed on the ACL entries in the following algorithm: 1. If the user requesting access ...<|separator|>
  24. [24]
    Cisco Systems, Inc. - Company-Histories.com
    1984: Cisco Systems, Inc. is founded by Leonard Bosack and Sandra Lerner. 1986: Company ships its first product, a router for the TCP/IP protocol suite. 1988: ...
  25. [25]
    [PDF] ansi incits 359-2004 - Prof. Ravi Sandhu
    The RBAC reference model is defined in terms of four model components—Core RBAC,. Hierarchical RBAC, Static Separation of Duty Relations, and Dynamic Separation ...
  26. [26]
    role-based access control (RBAC) - Glossary | CSRC
    RBAC is access control based on user roles, where permitted actions are identified with roles rather than individual subject identities.Missing: ANSI INCITS 359-2004
  27. [27]
    Comparing Simple Role Based Access Control Models and Access ...
    Nov 7, 1997 · RBAC is often distinguished from ACLs by the inclusion of a feature which allows a session to be associated with a proper subset of the roles ( ...Missing: scholarly | Show results with:scholarly
  28. [28]
    [PDF] scalable authorization in role-based access control using negative ...
    One of the most important benefits of RBAC is the simplification of administra- tion associated with managing access in a moderate to large scale system.
  29. [29]
    [PDF] The Economic Impact of Role-Based Access Control
    Abstractions can be centrally managed resulting in real permissions on real systems. In taking advantage of these abstractions RBAC offers greater.
  30. [30]
    [PDF] Guide to Attribute Based Access Control (ABAC) Definition and ...
    The XACML model employs elements such as rules, policies, rule- and policy-combining algorithms, attributes (subject, (resource) object, action and environment.
  31. [31]
    Performance analysis of dynamic ABAC systems using a queuing ...
    In this paper, we study the intricate problem of balancing access request resolution, accommodating dynamic authorization updates, and ABAC policy rebuilding.
  32. [32]
    [PDF] Attribute-based Access Control for Microservices-based Applications ...
    Attribute-based access control (ABAC) is an authorization framework or engine that computes decisions for user access requests based on attributes (properties) ...
  33. [33]
    [PDF] A Zero Trust Architecture Model for Access Control in Cloud-Native ...
    Sep 8, 2023 · Some examples of access control models include: Next Generation Access Control (NGAC) model, and. Attribute-based access control (ABAC) model. • ...
  34. [34]
    6.4. POSIX Access Control Lists | Red Hat Gluster Storage | 3.3
    POSIX Access Control Lists (ACLs) work around the limitations of this system by allowing administrators to also configure file and directory access permissions ...
  35. [35]
    [PDF] Improving the Granularity of Access Control for Windows 2000
    This paper presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed access control for both operating system components and ...Missing: interoperability | Show results with:interoperability
  36. [36]
    NCSC-TG-003 A GUIDE TO UNDERSTANDING DISCRETIONARY ...
    Sep 30, 1987 · 1 Minimum Functionality - The DAC mechanism should control access to individual named objects by named users. · 2 Functionality Not Required - ...Missing: scale | Show results with:scale<|separator|>
  37. [37]
    NFS4 ACL overview - SambaWiki - Samba.org
    Oct 17, 2022 · This is the correct naming because POSIX ACLs had actually never been finally standardized and the draft was even withdrawn back in 1997 in ...
  38. [38]
    (PDF) On the Performance of Access Control Policy Evaluation
    Thus policy evaluation performance needs to be considered while addressing traditional security concerns. This paper discusses policy system design principles ...
  39. [39]
    A05 Security Misconfiguration - OWASP Top 10:2025 RC1
    Security misconfiguration includes missing hardening, improper permissions, unnecessary features, default accounts, insecure settings, and outdated software.
  40. [40]
    [PDF] NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity ...
    Oct 5, 2023 · NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations . ... ACL on network shares and services. • Enforce use of ACLs ...
  41. [41]
    None
    Below is a merged summary of the Access Control (AC) Family from NIST SP 800-53r5, consolidating all the information from the provided segments into a comprehensive response. To retain as much detail as possible in a dense and structured format, I will use tables in CSV format where appropriate, followed by a narrative summary for additional context. The response includes all challenges, scalability, maintenance, and best practices mentioned across the segments, along with the useful URLs.