Looks like no one added any tags here yet for you.
Multi-program execution
Machines that can run more than one program simultaneously, raising the need for protection mechanisms to prevent interference between programs.
Access controls
Security measures at the application level that enforce domain-specific policies, such as restricting bank staff from viewing account details without proper authentication.
Middleware
Software that acts as a bridge between applications and databases, enforcing protection properties for data access.
Android app isolation
The operating system treats apps from different companies as separate users, protecting their data from each other.
Discretionary Access Control (DAC)
A protection mechanism where access rights are determined by the machine operator.
Mandatory Access Control (MAC)
A protection mechanism controlled by the vendor, safeguarding the operating system from malware modifications.
Protection domain
A set of processes or threads that share access to the same resources, rather than focusing on individual programs.
Access control matrices
Tools for implementing and modeling protection mechanisms, but can become unwieldy in large organizations.
Groups vs
Groups are lists of principals, while roles are fixed sets of access permissions that can be assumed by principals.
Access Control List (ACL)
A method of storing access rights column-wise, commonly used in Unix systems for managing file security.
ACL advantages
Simple implementation and user-managed file security, widely adopted in Unix-based systems.
ACL disadvantages
Inefficient for runtime security checks and tedious for auditing user access across many files.
Unix file permissions
Files have read, write, and execute attributes for owner, group, and world, with root having unrestricted access.
Set-user-id (suid)
A file attribute allowing a program to run with the privileges of its owner, which can lead to security vulnerabilities if misused.
Stateful access rules
Rules that complicate user revocation and tracking of file access, especially after termination.
Capability-based protection
A system where rights can be delegated easily, improving runtime security checks compared to ACLs.
IBM AS/400
A system that popularized capability-based protection in the mainstream computing market.
Public key certificates
Cryptographic tools that function as capabilities, allowing secure access delegation.
Trust relationships
The alignment of system trust with real-world trust dynamics to enhance security and reliability in access control.