Improving the granularity of access control for Windows 2000

@article{Swift2002ImprovingTG,
  title={Improving the granularity of access control for Windows 2000},
  author={Michael M. Swift and A. Hopkins and Peter Brundrett and C. V. Dyke and P. Garg and S. Chan and Mario Goertzel and Gregory Jensenworth},
  journal={ACM Trans. Inf. Syst. Secur.},
  year={2002},
  volume={5},
  pages={398-437}
}
  • Michael M. Swift, A. Hopkins, +5 authors Gregory Jensenworth
  • Published 2002
  • Computer Science
  • ACM Trans. Inf. Syst. Secur.
  • This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed access control for both operating system components and applications. These features were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000, and to protect computers connected to the Internet. While the access control mechanisms in Windows NT are suitable for file systems and applications with simple requirements, they fall short of the… CONTINUE READING
    24 Citations
    Access control with IBM Tivoli access manager
    • 80
    • PDF
    Policy management using access control spaces
    • 100
    • PDF
    Access Control in a World of Software Diversity
    • 18
    • PDF
    Cut me some security
    • 3
    • PDF
    Decentralized Access Control in Networked File Systems
    • 2
    Decentralized access control in distributed file systems
    • 49
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 16 REFERENCES
    TRON: Process-Specific File Protection for the UNIX Operating System
    • 95
    • Highly Influential
    • PDF
    Active Directory Services for Microsoft Windows 2000
    • 13
    • Highly Influential
    Integrating Flexible Support for Security Policies into the Linux Operating System
    • 657
    • Highly Influential
    • PDF
    WindowBox: a simple security model for the connected desktop
    • 43
    • Highly Influential
    • PDF
    Confining Root Programs with Domain and Type Enforcement
    • 112
    • Highly Influential
    • PDF
    MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications
    • Anurag Acharya, M. Raje
    • Computer Science
    • USENIX Security Symposium
    • 2000
    • 118
    • Highly Influential
    • PDF
    The UNIX time-sharing system
    • 790
    • Highly Influential
    Administering NDS corporate edition
    • 1
    • Highly Influential
    Meeting Critical Security Objectives with Security-Enhanced Linux
    • 142
    • Highly Influential
    • PDF
    Role-Based Access Control Models
    • 5,818
    • Highly Influential
    • PDF