细胞质是什么| 淋巴结反应性增生是什么意思| 白砂糖是什么糖| 生男孩女孩取决于什么| 一花一草一世界的下一句是什么| gp是什么| 春占生女是什么意思| 知柏地黄丸对男性功能有什么帮助| hs医学上是什么意思| 什么时候初伏第一天| 渐入佳境什么意思| 霸气是什么意思| ngu是什么意思| 甘霖是什么意思| 低烧是什么病的前兆| 夏季吃什么菜好| 挑拨离间是什么意思| 临床治愈什么意思| 梦到钱丢了预示着什么| 拉肚子能吃什么| 跳蚤最怕什么东西| 乌龟能吃什么水果| dw手表是什么档次| 自理是什么意思| 什么药治胃炎效果好| 龟吃什么| 丁火是什么意思| 梦见蛇什么意思| 尿蛋白是什么原因造成的| 1月21日什么星座| 晚上猫叫有什么预兆| 椭圆机是什么| guess是什么牌子| pdt是什么意思| 术后吃什么水果| 什么脱口秀| 汛期什么意思| 什么是活性叶酸| 卵巢早衰是什么意思| 屈原属什么生肖| 天年是什么意思| 皮肤糖化是什么意思| 175是什么码| 梦见石头是什么意思| 双皮奶为什么叫双皮奶| 左眼跳财是什么意思| hoka跑鞋中文叫什么| 胸腰椎退行性变是什么意思| 补钙吃什么食物最好最快中老年| 5月28日是什么星座| m代表什么| 月经期喝什么好| 总出虚汗是什么原因| 什么是脑梗塞| 前列腺多发钙化灶是什么意思| 男人结扎有什么危害| 什么的季节| 手掌发红是什么病| pfs是什么意思| 胃癌低分化是什么意思| 尽兴是什么意思| 手上有痣代表什么| 肝气不舒吃什么中成药| 睾丸是什么意思| 一天当中什么时候血压最高| 神灵是什么意思| 肿瘤出血意味着什么| 物以类聚人以群分什么意思| 勃艮第红是什么颜色| 组织部副部长是什么级别| adhd是什么病| 婴儿黄疸高有什么影响| 柏树长什么样子| 银耳长在什么地方| 白细胞酯酶弱阳性是什么意思| 三竖一横念什么| 印度人信仰什么教| 儿童吃什么| 水乳什么牌子好用| 睾丸变小是什么原因| 酒后手麻什么原因| 肚子胀痛什么原因| 什么是价值| 肺结节吃什么食物好| 双手抱在胸前代表什么| 梦见西红柿是什么预兆| 排卵期出血是什么颜色| 晨起嘴苦是什么原因| 打嗝是什么原因| herb是什么意思| 爸爸的姐姐应该叫什么| 咽鼓管炎吃什么药| 外痔用什么药| 青红皂白的皂是什么颜色| 金银花有什么作用| 尿突然是红褐色的是什么问题| 耳石症吃什么药最好| 九月八号什么星座| 头晕做什么检查| 藏红花有什么功效| 没吃多少东西但肚子很胀是什么| 海为什么是蓝色| 检查乙肝五项挂什么科| 盆腔少量积液是什么问题| 种牙好还是镶牙好区别是什么| 礽是什么意思| 头晕用什么药| 梦见手表是什么意思| 什么是心脑血管疾病| 来月经量少吃什么可以增加月经量| 中水是什么水| 唐氏综合症是什么病| 市公安局局长什么级别| 细胞质是什么| 脚抽筋是什么原因引起的| ige高是什么意思| 经行是什么意思| 藕粉不能和什么一起吃| 肌膜炎是什么原因造成的| 什么行业最赚钱投资小| 吃什么能快速减肥| 庞统为什么要献连环计| 寿辰是什么意思| 爱钻牛角尖是什么意思| cd8高是什么原因| 怀孕需要注意什么| 耳朵发热是什么原因| 什么叫肠化生| 拔罐的原理是什么| 老年人喝什么奶粉好| 什么是年金| 低钾是什么原因引起的| 江苏有什么山| 抗体是什么意思| 惊悉是什么意思| 膝盖里面痛什么原因引起的| 资治通鉴讲的是什么| 减肥应该吃什么| 记忆力减退是什么原因造成的| 仰卧起坐是什么现象| 糖尿病筛查做什么检查| 什么的天空填合适的词| doris什么意思| 摩羯座是什么性格| 南京为什么那么多梧桐树| 脚背肿是什么原因引起的| 谨言慎行下一句是什么| 曲安奈德是什么药| 孕妇缺营养吃什么补| 76年属什么的生肖| 伸什么缩什么| 什么是业障| qid医学上是什么意思| 汾酒是什么香型| 大便干结是什么原因| 欲言又止的欲什么意思| 真菌性龟头炎用什么药| 浮生若梦什么意思| 俯卧撑有什么好处| 籽料是什么意思| 津液亏虚吃什么中成药| 国企是什么意思| 肚子一按就痛什么原因| 梦见好多猪肉是什么意思| 舌苔厚口臭吃什么药好| 全套半套什么意思| 打喷嚏漏尿是什么原因| 血小板有什么作用| h家是什么牌子| 醒酒喝什么| 脑梗看什么科| 鞠婧祎什么学历| 鲫鱼喜欢吃什么| 恋爱是什么| 木字五行属什么| 什么而不舍| 朋友妻不可欺是什么意思| 芈月是秦始皇的什么人| 表彰是什么意思| 痘痘破了涂什么药膏| 粉色是什么颜色| 属狗是什么星座| 西安有什么山| 油面筋是什么做的| 情感障碍是什么意思| 什么是速写| 所言极是是什么意思| 青核桃皮的功效与作用是什么| 一代宗师是什么意思| 8月13号什么星座| 9.25是什么星座| 牙齿为什么会变黑| 手和脚发麻是什么原因| 金匮肾气丸有什么作用| yp什么意思| 大姨夫是什么| 总是掉头发是什么原因| 生物电是什么| 红细胞高是什么原因| 梦见新房子是什么意思| 孕妇缺铁吃什么食物好| 尿黄尿味大难闻是什么原因| oct什么意思| 阴道长什么样| 怎么吃都不胖是什么原因| 早晨起床口干口苦是什么原因| 体内湿热吃什么中成药| 牙齿痛是什么原因| 什么可以代替狗狗沐浴露| 叶酸基因检测是什么| 补充镁有什么好处| php是什么意思| 万宝龙属于什么档次| 钮祜禄氏现在姓什么| 肉筋是什么| 失眠用什么药| 医联体是什么意思| 心率慢吃什么药| 大便有凹槽是什么原因| 宝宝上颚有白点是什么| 什么牌子的洗衣机好| 当律师需要什么条件| 一什么沙发| 寸头适合什么脸型| 为什么叫书记| 0和1什么意思| 备孕叶酸什么时候吃最好| 梦见和死去的人说话是什么意思| 昶字五行属什么| 拉肚子是什么原因造成的| 羊跟什么生肖最配| 羊水污染是什么原因造成的| 质变是什么意思| 芥末配什么好吃| g6pd是检查什么的| 牙银肿痛吃什么药| 不疼不痒的红疹是什么| 阳痿早泄挂什么科| 四大是什么| 1月1号是什么星座| 康复是什么意思| 革兰氏阳性菌是什么病| 下寒上热体质吃什么中成药| 水落石出是什么生肖| 什么宠物好养又干净| 气色是什么意思| 东北方是什么方位| 腊肉炒什么菜最好吃| 结肠炎吃什么药效果最好| 家里为什么会有壁虎| 补钙吃什么食物最好最快中老年| 婴儿大便有泡沫是什么原因| 耀字五行属什么| 雷字五行属什么| 珏字五行属什么| 金生水什么意思| 掮客是什么意思| 为什么喝牛奶会拉肚子| 内心丰盈是什么意思| 黄芪是什么| 黄芪的功效与作用是什么| river是什么意思| 冒节子是什么东西| 什么牌子的蜂胶最好| 百度Jump to content

From Wikipedia, the free encyclopedia
百度 二.出手阔绰派:一年的辛苦工作结束,明星老板不仅自己赚的盆满钵满,也不忘记那些跟着自己东奔西跑的身影!对于工作人员来说,还有什么是比钞票更简单粗暴的呢?所以,深谙这一金钱定律的明星老板,豪车豪游就成了分分钟的事儿...去年春节,贾乃亮经纪人就在自己的朋友圈内晒出了年终奖:一辆价值七八十万元的汽车。

In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access. Authentication and access control are often combined into a single operation, so that access is approved based on successful authentication, or based on an anonymous access token. Authentication methods and tokens include passwords, biometric scans, physical keys, electronic keys and devices, hidden paths, social barriers, and monitoring by humans and automated systems.[citation needed]

Software entities

[edit]

In any access-control model, the entities that can perform actions on the system are called subjects, and the entities representing resources to which access may need to be controlled are called objects (see also Access Control Matrix). Subjects and objects should both be considered as software entities, rather than as human users: any human users can only have an effect on the system via the software entities that they control.[citation needed]

Although some systems equate subjects with user IDs, so that all processes started by a user by default have the same authority, this level of control is not fine-grained enough to satisfy the principle of least privilege, and arguably is responsible for the prevalence of malware in such systems (see computer insecurity).[citation needed]

In some models, for example the object-capability model, any software entity can potentially act as both subject and object.[citation needed]

As of 2014, access-control models tend to fall into one of two classes: those based on capabilities and those based on access control lists (ACLs).

  • In a capability-based model, holding an unforged-able reference or capability to an object, that provides access to the object (roughly analogous to how possession of one's house key grants one access to one's house); access is conveyed to another party by transmitting such a capability over a secure channel.
  • In an ACL-based model, a subject's access to an object or group of objects [1] depends on whether its identity appears on a list associated with the object (roughly analogous to how a bouncer at a private party would check an ID to see if a name appears on the guest list); access is conveyed by editing the list. (Different ACL systems have a variety of different conventions regarding who or what is responsible for editing the list and how it is edited.)[citation needed]

Both capability-based and ACL-based models have mechanisms to allow access rights to be granted to all members of a group of subjects (often the group is itself modeled as a subject).[citation needed]

Services

[edit]

Access control systems provide the essential services of authorization, identification and authentication (I&A), access approval, and accountability where:[citation needed]

  • authorization specifies what a subject can do
  • identification and authentication ensure that only legitimate subjects can log on to a system
  • access approval grants access during operations, by association of users with the resources that they are allowed to access, based on the authorization policy
  • accountability identifies what a subject (or all subjects associated with a user) did

Authorization

[edit]

Authorization involves the act of defining access-rights for subjects. An authorization policy specifies the operations that subjects are allowed to execute within a system.[citation needed]

Most modern operating systems implement authorization policies as formal sets of permissions that are variations or extensions of three basic types of access:[citation needed]

  • Read (R): The subject can:
    • Read file contents
    • List directory contents
  • Write (W): The subject can change the contents of a file or directory with the following tasks:
    • Add
    • Update
    • Delete
    • Rename
  • Execute (X): If the file is a program, the subject can cause the program to be run. (In Unix-style systems, the "execute" permission doubles as a "traverse directory" permission when granted for a directory.)

These rights and permissions are implemented differently in systems based on discretionary access control (DAC) and mandatory access control (MAC).

Identification and authentication

[edit]

Identification and authentication (I&A) is the process of verifying that an identity is bound to the entity that makes an assertion or claim of identity. The I&A process assumes that there was an initial validation of the identity, commonly called identity proofing. Various methods of identity proofing are available, ranging from in-person validation using government issued identification, to anonymous methods that allow the claimant to remain anonymous, but known to the system if they return. The method used for identity proofing and validation should provide an assurance level commensurate with the intended use of the identity within the system. Subsequently, the entity asserts an identity together with an authenticator as a means for validation. The only requirements for the identifier is that it must be unique within its security domain.[citation needed]

Authenticators are commonly based on at least one of the following four factors:[citation needed]

  • Something you know, such as a password or a personal identification number (PIN). This assumes that only the owner of the account knows the password or PIN needed to access the account.
  • Something you have, such as a smart card or security token. This assumes that only the owner of the account has the necessary smart card or token needed to unlock the account.
  • Something you are, such as fingerprint, voice, retina, or iris characteristics.
  • Where you are, for example inside or outside a company firewall, or proximity of login location to a personal GPS device.

Access approval

[edit]

Access approval is the function that actually grants or rejects access during operations.[2]

During access approval, the system compares the formal representation of the authorization policy with the access request, to determine whether the request shall be granted or rejected. Moreover, the access evaluation can be done online/ongoing.[3]

Accountability

[edit]

Accountability uses such system components as audit trails (records) and logs, to associate a subject with its actions. The information recorded should be sufficient to map the subject to a controlling user. Audit trails and logs are important for[citation needed]

  • Detecting security violations
  • Re-creating security incidents

If no one is regularly reviewing your logs and they are not maintained in a secure and consistent manner, they may not be admissible as evidence.[citation needed]

Many systems can generate automated reports, based on certain predefined criteria or thresholds, known as clipping levels. For example, a clipping level may be set to generate a report for the following:[citation needed]

  • More than three failed logon attempts in a given period
  • Any attempt to use a disabled user account

These reports help a system administrator or security administrator to more easily identify possible break-in attempts. – Definition of clipping level:[4] a disk's ability to maintain its magnetic properties and hold its content. A high-quality level range is 65–70%; low quality is below 55%.

Access controls

[edit]

Access control models are sometimes categorized as either discretionary or non-discretionary. The three most widely recognized models are Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Role Based Access Control (RBAC). MAC is non-discretionary.[citation needed]

Discretionary access control

[edit]

Discretionary access control (DAC) is a policy determined by the owner of an object. The owner decides who is allowed to access the object, and what privileges they have.

Two important concepts in DAC are[citation needed]

  • File and data ownership: Every object in the system has an owner. In most DAC systems, each object's initial owner is the subject that caused it to be created. The access policy for an object is determined by its owner.
  • Access rights and permissions: These are the controls that an owner can assign to other subjects for specific resources.

Access controls may be discretionary in ACL-based or capability-based access control systems. (In capability-based systems, there is usually no explicit concept of 'owner', but the creator of an object has a similar degree of control over its access policy.)

Mandatory access control

[edit]

Mandatory access control refers to allowing access to a resource if and only if rules exist that allow a given user to access the resource. It is difficult to manage, but its use is usually justified when used to protect highly sensitive information. Examples include certain government and military information. Management is often simplified (over what is required) if the information can be protected using hierarchical access control, or by implementing sensitivity labels. What makes the method "mandatory" is the use of either rules or sensitivity labels.[citation needed]

  • Sensitivity labels: In such a system subjects and objects must have labels assigned to them. A subject's sensitivity label specifies its level of trust. An object's sensitivity label specifies the level of trust required for access. In order to access a given object, the subject must have a sensitivity level equal to or higher than the requested object.
  • Data import and export: Controlling the import of information from other systems and export to other systems (including printers) is a critical function of these systems, which must ensure that sensitivity labels are properly maintained and implemented so that sensitive information is appropriately protected at all times.

Two methods are commonly used for applying mandatory access control:[citation needed]

  • Rule-based (or label-based) access control: This type of control further defines specific conditions for access to a requested object. A Mandatory Access Control system implements a simple form of rule-based access control to determine whether access should be granted or denied by matching:
    • An object's sensitivity label
    • A subject's sensitivity label
  • Lattice-based access control: These can be used for complex access control decisions involving multiple objects and/or subjects. A lattice model is a mathematical structure that defines greatest lower-bound and least upper-bound values for a pair of elements, such as a subject and an object.

Few systems implement MAC; XTS-400 and SELinux are examples of systems that do.

Role-based access control

[edit]

Role-based access control (RBAC) is an access policy determined by the system, not by the owner. RBAC is used in commercial applications and also in military systems, where multi-level security requirements may also exist. RBAC differs from DAC in that DAC allows users to control access to their resources, while in RBAC, access is controlled at the system level, outside of the user's control. Although RBAC is non-discretionary, it can be distinguished from MAC primarily in the way permissions are handled. MAC controls read and write permissions based on a user's clearance level and additional labels. RBAC controls collections of permissions that may include complex operations such as an e-commerce transaction, or may be as simple as read or write. A role in RBAC can be viewed as a set of permissions.

Three primary rules are defined for RBAC:

  1. Role assignment: A subject can execute a transaction only if the subject has selected or been assigned a suitable role.
  2. Role authorization: A subject's active role must be authorized for the subject. With rule 1 above, this rule ensures that users can take on only roles for which they are authorized.
  3. Transaction authorization: A subject can execute a transaction only if the transaction is authorized for the subject's active role. With rules 1 and 2, this rule ensures that users can execute only transactions for which they are authorized.

Additional constraints may be applied as well, and roles can be combined in a hierarchy where higher-level roles subsume permissions owned by lower-level sub-roles.

Most IT vendors offer RBAC in one or more products.

Attribute-based access control

[edit]

In attribute-based access control (ABAC),[5][6] access is granted not based on the rights of the subject associated with a user after authentication, but based on the attributes of the subject, object, requested operations, and environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes.[7] The user has to prove so-called claims about his or her attributes to the access control engine. An attribute-based access control policy specifies which claims need to be satisfied in order to grant access to an object. For instance the claim could be "older than 18". Any user that can prove this claim is granted access. Users can be anonymous when authentication and identification are not strictly required. One does, however, require means for proving claims anonymously. This can for instance be achieved using anonymous credentials.[citation needed] XACML (extensible access control markup language) is a standard for attribute-based access control. XACML 3.0 was standardized in January 2013.[8]

Break-Glass Access Control Models

[edit]

Traditionally, access has the purpose of restricting access, thus most access control models follow the "default deny principle", i.e. if a specific access request is not explicitly allowed, it will be denied. This behavior might conflict with the regular operations of a system. In certain situations, humans are willing to take the risk that might be involved in violating an access control policy, if the potential benefit that can be achieved outweighs this risk. This need is especially visible in the health-care domain, where a denied access to patient records can cause the death of a patient. Break-Glass (also called break-the-glass) try to mitigate this by allowing users to override access control decision. Break-Glass can either be implemented in an access control specific manner (e.g. into RBAC),[9] or generic (i.e., independent from the underlying access control model).[10]

Host-based access control (HBAC)

[edit]

The initialism HBAC stands for "host-based access control".[11]

See also

[edit]

References

[edit]
  1. ^ Feio, Rui; et al. (August 12, 2014). ABCs of IBM Z/OS System Programming Volume 6 (2nd ed.). IBM Corporation. p. 24. ISBN 9780738439808. Retrieved December 17, 2024.
  2. ^ Dieter Gollmann. Computer Security, 3rd ed. Wiley Publishing, 2011, p. 387, bottom
  3. ^ Marcon, A. L.; Olivo Santin, A.; Stihler, M.; Bachtold, J., "A UCONabc Resilient Authorization Evaluation for Cloud Computing," Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 2, pp. 457–467, Feb. 2014 doi:10.1109/TPDS.2013.113, bottom
  4. ^ "Definition of: clipping level". PC Magazine. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  5. ^ Jin, Xin, Ram Krishnan, and Ravi Sandhu. "A unified attribute-based access control model covering dac, mac and rbac." Data and Applications Security and Privacy XXVI. Springer Berlin Heidelberg, 2012. 41–55.
  6. ^ Hu, Vincent C.; Ferraiolo, David; Kuhn, Rick; Schnitzer, Adam; Sandlin, Kenneth; Miller, Robert; Scarfone, Karen. "Guide to Attribute Based Access Control (ABAC) Definition and Considerations" (PDF). {{cite journal}}: Cite journal requires |journal= (help)
  7. ^ Hu, Vincent C. (2013). "Guide to Attribute Based Access Control (ABAC) Definition and Considerations (Draft)". National Institute of Standards and Technology. 800 (162): 54.
  8. ^ eXtensible Access Control Markup Language (XACML) V3.0 approved as an OASIS Standard, eXtensible Access Control Markup Language (XACML) V3.0 approved as an OASIS Standard.
  9. ^ Ferreira, Ana; Chadwick, David; Farinha, Pedro; Correia, Ricardo; Zao, Gansen; Chiro, Rui; Antunes, Luis (2009). "How to Securely Break into RBAC: The BTG-RBAC Model". Computer Security Applications Conference (ACSAC). IEEE. pp. 23–31. doi:10.1109/ACSAC.2009.12. hdl:10216/21676.
  10. ^ Brucker, Achim D.; Petritsch, Helmut (2009). "Extending Access Control Models with Break-glass.". ACM symposium on access control models and technologies (SACMAT). ACM Press. pp. 197–206. doi:10.1145/1542207.1542239.
  11. ^ Ballard, Ella Deon (2013). "Identity Management Guide: Managing Identity and Authorization Policies for Linux-Based Infrastructures". Red Hat. Retrieved 2025-08-06. Any PAM service can be identified as to the host-based access control (HBAC) system in IdM.
子宫破裂有什么危险 什么样的人招蚊子 血栓是什么病 手腕疼是什么原因 daily是什么意思
膝盖积液用什么药最好 复方石韦胶囊治什么病 1969年属什么生肖 脸部出油多是什么原因 昭是什么意思
大便的颜色代表什么 结肠炎吃什么药治疗效果好 什么小吃最火爆最赚钱 什么是gay 为什么叫五十肩
舌苔黄是什么原因引起的 雷什么风什么成语 泰坦尼克号什么时候上映的 小孩肺炎吃什么药 撒旦和路西法什么关系
白色属于五行属什么hcv9jop1ns6r.cn 丁香茶有什么作用和功效hcv8jop2ns7r.cn 吃紧急避孕药有什么副作用hcv8jop4ns6r.cn 噩梦是什么意思hcv9jop0ns0r.cn 大小便失禁是什么原因hcv8jop0ns7r.cn
mankind是什么意思hcv7jop5ns2r.cn 17年是什么年hcv8jop1ns7r.cn 妊娠反应什么时候开始hcv9jop5ns3r.cn 用什么水和面烙饼最软hcv9jop5ns6r.cn 望闻问切什么意思hcv8jop5ns4r.cn
肝火旺盛吃什么食物好hcv8jop6ns5r.cn 什么人容易得帕金森病dayuxmw.com 算了是什么意思hcv8jop2ns5r.cn 上日下文念什么hcv8jop3ns3r.cn 胃烧心是什么原因gangsutong.com
谷草转氨酶高吃什么药hcv7jop9ns4r.cn 半月板是什么部位hcv8jop6ns7r.cn 被虫咬了挂什么科hcv8jop4ns7r.cn 荷花和睡莲有什么区别gangsutong.com 痛风吃什么食物好得快hcv8jop3ns1r.cn
百度