Statements (28)
Predicate | Object |
---|---|
gptkbp:instanceOf |
computer security concept
|
gptkbp:canBe |
allow list
deny list |
gptkbp:component |
gptkb:discretionary_access_control_(DAC)
gptkb:mandatory_access_control_(MAC) |
gptkbp:controls |
access to resources
|
gptkbp:eachEntrySpecifies |
gptkb:execution
Thread permission |
gptkbp:example |
gptkb:Windows_NTFS_permissions
Cisco router access lists Linux file permissions (POSIX ACLs) |
https://www.w3.org/2000/01/rdf-schema#label |
Access Control List (ACL)
|
gptkbp:introducedIn |
1970s
|
gptkbp:numberOfLocations |
list of access control entries (ACEs)
|
gptkbp:purpose |
define permissions
|
gptkbp:relatedTo |
capability-based security
role-based access control (RBAC) |
gptkbp:specifies |
what operations are allowed
which users or system processes can access objects |
gptkbp:standardizedBy |
gptkb:IETF
gptkb:POSIX |
gptkbp:usedIn |
operating systems
file systems network devices |
gptkbp:bfsParent |
gptkb:Access_Control_(AC)
gptkb:Windows_NTFS_permissions |
gptkbp:bfsLayer |
7
|