This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed access control for both operating system components and applications. These features were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000, and to protect computers connected to the Internet. While the access control mechanisms in Windows NT are suitable for file systems and applications with simple requirements, they fall short of the needs of applications with complex data objects. Our goal was to use operating system access control mechanisms to protect a large object hierarchy with many types of objects, each with many data properties. We also wanted to reduce the exposure of u...
The research described in this work can significantly simplify and facilitate the creation and confi...
Access control mechanisms are needed in almost every system nowadays to control what kind of access ...
Access control is the process of mediating every request to resources and data maintained by a syste...
This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed ...
Microsoft Windows 2000 includes a set of new features. Some of these features give administrators be...
The Windows Embedded operating system (OS) adopts a discretionary access control (DAC)-based policy,...
Sub-Operating Systems: A New Approach to Application Security Users regularly exchange apparently in...
Protecting access to digital resources is one of the fundamental problems recognized in computer sec...
Users regularly exchange apparently innocuous data files using email and ftp. While the users view t...
Users regularly exchange apparently innocuous data files using email and ftp. While the users view t...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
In Microsoft Windows, two vulnerabilities have been successfully exploited for attacks for years now...
Access control is a fundamental problem in all businesses and controlling access to computer and net...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effect...
The research described in this work can significantly simplify and facilitate the creation and confi...
Access control mechanisms are needed in almost every system nowadays to control what kind of access ...
Access control is the process of mediating every request to resources and data maintained by a syste...
This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed ...
Microsoft Windows 2000 includes a set of new features. Some of these features give administrators be...
The Windows Embedded operating system (OS) adopts a discretionary access control (DAC)-based policy,...
Sub-Operating Systems: A New Approach to Application Security Users regularly exchange apparently in...
Protecting access to digital resources is one of the fundamental problems recognized in computer sec...
Users regularly exchange apparently innocuous data files using email and ftp. While the users view t...
Users regularly exchange apparently innocuous data files using email and ftp. While the users view t...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
In Microsoft Windows, two vulnerabilities have been successfully exploited for attacks for years now...
Access control is a fundamental problem in all businesses and controlling access to computer and net...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effect...
The research described in this work can significantly simplify and facilitate the creation and confi...
Access control mechanisms are needed in almost every system nowadays to control what kind of access ...
Access control is the process of mediating every request to resources and data maintained by a syste...