Improving the granularity of access control for Windows 2000
@article{Swift2002ImprovingTG, title={Improving the granularity of access control for Windows 2000}, author={Michael M. Swift and A. Hopkins and Peter Brundrett and C. V. Dyke and P. Garg and S. Chan and Mario Goertzel and Gregory Jensenworth}, journal={ACM Trans. Inf. Syst. Secur.}, year={2002}, volume={5}, pages={398-437} }
This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed access control for both operating system components and applications. These features were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000, and to protect computers connected to the Internet. While the access control mechanisms in Windows NT are suitable for file systems and applications with simple requirements, they fall short of the… CONTINUE READING
Figures, Tables, and Topics from this paper
24 Citations
IDEAS: An Identity-based Security Architecture for Large-scale and High-performance Storage Systems
- Computer Science
- 2008
- 1
The tees confidentiality model: an authorisation model for identities and roles
- Computer Science
- SACMAT '03
- 2003
- 28
Decentralized access control in distributed file systems
- Computer Science
- CSUR
- 2008
- 49
- Highly Influenced
- PDF
References
SHOWING 1-10 OF 16 REFERENCES
TRON: Process-Specific File Protection for the UNIX Operating System
- Computer Science
- USENIX
- 1995
- 95
- Highly Influential
- PDF
Integrating Flexible Support for Security Policies into the Linux Operating System
- Computer Science
- USENIX Annual Technical Conference, FREENIX Track
- 2001
- 657
- Highly Influential
- PDF
WindowBox: a simple security model for the connected desktop
- Computer Science
- 2000
- 43
- Highly Influential
- PDF
Confining Root Programs with Domain and Type Enforcement
- Computer Science
- USENIX Security Symposium
- 1996
- 112
- Highly Influential
- PDF
MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications
- Computer Science
- USENIX Security Symposium
- 2000
- 118
- Highly Influential
- PDF
Meeting Critical Security Objectives with Security-Enhanced Linux
- Business
- 2001
- 142
- Highly Influential
- PDF