乙肝大三阳是什么意思| 拉肚子吃什么药最好| 庞统为什么要献连环计| 红萝卜和胡萝卜有什么区别| 虎皮兰开花寓意什么| 扁桃体发炎吃什么药好得快| 7月出生是什么星座| 姜黄粉是什么做的| 嘴角长疱疹是什么原因| 珍珠疹是什么原因引起的| 潮热是什么意思| 女人吃鹿茸有什么好处| 盂是什么意思| 胰腺在人体什么位置| 甲肝是什么病| 结婚六十年是什么婚| 壁报交流是什么意思| 亟是什么意思| 凶狠的反义词是什么| 肚子疼应该吃什么药| 火山为什么会喷发| 梦见皮带断了什么预兆| 入职体检70元一般检查什么| 壬午五行属什么| 红霉素软膏有什么作用| 吃什么补钾最快最好| 秋葵和什么不能一起吃| 昵称什么意思| 地铁是什么| 柚子什么时候成熟| 乳腺结节有什么症状| 开普拉多的都是什么人| 除湿气喝什么茶| wht什么颜色| 奥地利讲什么语言| 天厨贵人是什么意思| 头汗多是什么原因引起的| 龙眼有什么品种| 肺纤维灶是什么意思| 阴部潮湿是什么原因| 霍霍是什么意思| 眼睛晶体是什么| 舌下含服是什么意思| 有脚气是什么原因引起的| 腰疼是什么原因| 三观是什么意思| 梦见自己家盖房子是什么预兆| 胆结石能吃什么| 怀孕分泌物是什么样的| 三个又是什么字| 诸行无常是什么意思| 乳腺增生是什么原因引起的| 1964年是什么命| 什么是生化流产| 毛囊炎用什么药膏最好| 长期干咳无痰是什么原因引起的| 支气管炎用什么药| 经常掉头发是什么原因| 黄体酮有什么副作用| 看金鱼是什么梗| 1971年属什么生肖| 疏导是什么意思| 结婚九年是什么婚| 紧急避孕药什么时候吃最好| 股癣用什么药膏最好| 瘦的人吃什么才能变胖| 属兔与什么属相相克| 什么病不能吃茄子| 囊胚是什么意思| 剪什么样的发型好看| 经期为什么不能拔牙| 升结肠管状腺瘤是什么意思| 单丛属于什么茶| 疣是什么病毒| 脚凉是什么原因| 睾丸长什么样子| 睾丸炎有什么症状| 扁桃体发炎什么症状| 男人断眉有什么说法| 梦见老鼠是什么征兆| mafia是什么意思| 右边偏头痛什么原因| 铁观音是什么茶| 985代表什么意思| saq是什么意思| 鼻炎吃什么药效果最好| jps是什么意思| 前列腺在哪里男人的什么部位| 肝右叶钙化灶是什么意思| 为什么突然长癣了| 洋葱炒什么菜好吃| 纳氏囊肿是什么意思| 酸野是什么| 美国为什么帮以色列| 10月15日是什么星座| 每天吃鸡蛋有什么好处和坏处| 手臂上长痣代表什么| 妥投是什么意思| 什么补血| 神经性头疼是什么症状| 小苏打和柠檬酸反应产生什么| 鞘膜积液是什么病| 胃疼有什么办法缓解| 易拉罐是什么垃圾| 什么叫朋友| 舌根起泡是什么原因| 劳热是什么意思| 白头发吃什么药| 身上有白斑块是什么原因造成的| 乳房胀痛吃什么药| 地铁和高铁有什么区别| 梦见男朋友出轨了是什么意思| 什么人不能喝大麦茶| 星期三打喷嚏代表什么| 爸爸的姐姐叫什么| 马躺下睡觉为什么会死| 阴道炎用什么栓剂| 红花配绿叶是什么意思| 莳是什么意思| 高血糖吃什么菜好| 长智齿意味着什么| 淋巴细胞低说明什么| nokia是什么牌子的手机| 八卦是什么| 喝红糖水有什么好处| 子宫瘢痕憩室是什么病| 副检察长什么级别| 什么时间英文| 幽门杆菌吃什么药| 霉菌孢子是什么意思| 偶发室性早搏什么意思| 梦见好多水是什么预兆| 什么叫做基本工资| 生吃蛇胆有什么功效| 为什么叫印度阿三| 干什么挣钱最快| 我国计划生育什么时候开始| 小金人车标是什么车| 肩膀酸胀是什么原因| 牛蛙不能和什么一起吃| 吃海参有什么功效| 荷叶有什么功效| 唔什么意思| c肽测定是什么意思| 政委是什么军衔| 低压偏高什么原因| 镶嵌什么意思| 231是什么意思| 什么是福报| 婴儿蓝是什么颜色| asia是什么意思| 降低转氨酶吃什么药| 嗓子疼吃什么药好| 粘胶纤维是什么| 防晒衣什么面料好| 脑膜瘤钙化意味着什么| 兆以上的计数单位是什么| 胆囊壁胆固醇结晶是什么意思| 百香果什么时候开花结果| 金星原名叫什么| 低血压有什么危害| 黄鼠狼是什么科| 萎缩性胃炎用什么药最好| 三个土念什么| 6月17号是什么星座| 蛋白尿是什么意思| 为什么会得扁平疣| b超什么时候做| mac是什么牌子| 为什么体重一直下降| 葡萄和提子有什么区别| 什么叫单亲家庭| 轻度抑郁症吃什么药| 风寒吃什么感冒药| 什么是同位素| 嘴巴苦什么原因| 为什么会无缘无故长痣| 退位让贤是什么意思| 7.17是什么日子| 什么是胰腺癌| 糖尿病人能喝什么饮料| 永字五行属什么| 加湿器用什么水比较好| 地贫有什么症状| 阿昔洛韦片治什么病| 子宫内膜异位症是什么意思| 小月子是什么意思| 肉夹馍是什么肉| 吃阿胶对女人有什么好处| 经常吃南瓜有什么好处和坏处| gccg是什么牌子| 神经性皮炎是什么原因引起的| 什么样的情况下需要做肠镜| 什么食物消炎效果好| 两袖清风是什么生肖| 海米是什么东西| 梦见手指流血是什么预兆| 智齿吃什么消炎药| 吃土豆有什么好处| 大美女是什么意思| 邓超什么星座的| 产妇吃什么水果好| 人体缺甲是什么症状| 深圳市长什么级别| 性格开朗是什么意思| 气性坏疽是什么病| 海蓝宝五行属什么| 鸡蛋吃多了有什么坏处| 支气管炎吃什么| 什么是富氢水| 双鱼座和什么星座最配| 孢子是什么东西| 脑梗吃什么药可以恢复的快| 千古一帝指什么生肖| 但求无愧于心上句是什么| 风寒感冒吃什么食物| 反流性食管炎吃什么中药| 电轴左偏是什么原因| 乐松是什么药| 浮肿吃什么药| 什么的秋天| 大千世界什么意思| 八月十三号是什么星座| 1946年属什么生肖| 鸡枞菌长在什么地方| 什么花在什么时间开| 什么的娃娃| 梦到别人结婚是什么意思| 深圳市长什么级别| 寻麻疹是什么| 太后是皇上的什么人| 久坐脚肿是什么原因| 混油皮是什么特征| 日落西山是什么生肖| 出汗太多会对身体造成什么伤害| 肌层回声均匀是什么意思| 葡萄什么时候成熟| 身体欠佳什么意思| 714什么星座| 唱腔是什么意思| 94年是什么命| 12五行属什么| 胆囊炎吃什么好| 静脉曲张 看什么科| 秦始皇的真名叫什么| 负面影响是什么意思| 湿气太重吃什么排湿最快| 喉咙发苦是什么原因造成的| 更年期补钙吃什么钙片好| 凿壁偷光是什么意思| 正畸和矫正有什么区别| 三月十七是什么星座| Valentino什么牌子| 夜幕降临是什么意思| 肝郁有什么症状| 什么药一吃就哑巴了| 芒果有什么营养| 梦见吐痰是什么意思| 葡萄胎是什么| 闲鱼转卖什么意思| 火头鱼是什么鱼| 五官立体是什么意思| 口臭什么原因引起的| 辞退和开除有什么区别| 百度

碧桂园集团向贵阳市农民(市民)讲习所捐赠《半月谈》

百度 随后,国家发改委发布的相关通知也明确了这一目标,并提出全面放宽进城落户条件。

In computer security, an access-control list (ACL) is a list of permissions[a] associated with a system resource (object or facility). An ACL specifies which users or system processes are granted access to resources, as well as what operations are allowed on given resources.[1] Each entry in a typical ACL specifies a subject and an operation. For instance,

  • If a file object has an ACL that contains(Alice: read,write; Bob: read), this would give Alice permission to read and write the file and give Bob permission only to read it.
  • If the Resource Access Control Facility (RACF) profile CONSOLE CLASS(TSOAUTH) has an ACL that contains(ALICE:READ), this would give ALICE permission to use the TSO CONSOLE command.

Implementations

edit

Many kinds of operating systems implement ACLs or have a historical implementation; the first implementation of ACLs was in the filesystem of Multics in 1965.[2][3]

Filesystem ACLs

edit

A filesystem ACL is a data structure (usually a table) containing entries that specify individual user or group rights to specific system objects such as programs, processes, or files. These entries are known as access-control entries (ACEs) in the Microsoft Windows NT,[4] OpenVMS, and Unix-like operating systems such as Linux, macOS, and Solaris. Each accessible object contains an identifier to its ACL. The privileges or permissions determine specific access rights, such as whether a user can read from, write to, or execute an object. In some implementations, an ACE can control whether or not a user, or group of users, may alter the ACL on an object.

One of the first operating systems to provide filesystem ACLs was Multics. PRIMOS featured ACLs at least as early as 1984.[5]

In the 1990s the ACL and role-based access control (RBAC) models were extensively tested[by whom?] and used to administer file permissions.

POSIX ACL

edit

POSIX 1003.1e/1003.2c working group made an effort to standardize ACLs, resulting in what is now known as "POSIX.1e ACL" or simply "POSIX ACL".[6] The POSIX.1e/POSIX.2c drafts were withdrawn in 1997 due to participants losing interest for funding the project and turning to more powerful alternatives such as NFSv4 ACL.[7] As of December 2019, no live sources of the draft could be found on the Internet, but it can still be found in the Internet Archive.[8]

Most of the Unix and Unix-like operating systems (e.g. Linux since 2.5.46 or November 2002,[9] FreeBSD, or Solaris) support POSIX.1e ACLs (not necessarily draft 17). ACLs are usually stored in the extended attributes of a file on these systems.

NFSv4 ACL

edit

NFSv4 ACLs are much more powerful than POSIX draft ACLs. Unlike draft POSIX ACLs, NFSv4 ACLs are defined by an actually published standard, as part of the Network File System.

NFSv4 ACLs are supported by many Unix and Unix-like operating systems. Examples include AIX, FreeBSD,[10] Mac OS X beginning with version 10.4 ("Tiger"), or Solaris with ZFS filesystem,[11] support NFSv4 ACLs, which are part of the NFSv4 standard. There are two experimental implementations of NFSv4 ACLs for Linux: NFSv4 ACLs support for Ext3 filesystem[12] and the more recent Richacls, which brings NFSv4 ACLs support for Ext4 filesystem.[13] As with POSIX ACLs, NFSv4 ACLs are usually stored as extended attributes on Unix-like systems.

NFSv4 ACLs are organized nearly identically to the Windows NT ACLs used in NTFS.[14] NFSv4.1 ACLs are a superset of both NT ACLs and POSIX draft ACLs.[15] Samba supports saving the NT ACLs of SMB-shared files in many ways, one of which is as NFSv4-encoded ACLs.[16]

Active Directory ACLs

edit

Microsoft's Active Directory service implements an LDAP server that stores and disseminates configuration information about users and computers in a domain.[17] Active Directory extends the LDAP specification by adding the same type of access-control list mechanism as Windows NT uses for the NTFS filesystem. Windows 2000 then extended the syntax for access-control entries such that they could not only grant or deny access to entire LDAP objects, but also to individual attributes within these objects.[18]

Networking ACLs

edit

On some types of proprietary computer hardware (in particular, routers and switches), an access-control list provides rules that are applied to port numbers or IP addresses that are available on a host or other layer 3, each with a list of hosts and/or networks permitted to use the service. Although it is additionally possible to configure access-control lists based on network domain names, this is a questionable idea because individual TCP, UDP, and ICMP headers do not contain domain names. Consequently, the device enforcing the access-control list must separately resolve names to numeric addresses. This presents an additional attack surface for an attacker who is seeking to compromise security of the system which the access-control list is protecting. Both individual servers and routers can have network ACLs. Access-control lists can generally be configured to control both inbound and outbound traffic, and in this context they are similar to firewalls. Like firewalls, ACLs could be subject to security regulations and standards such as PCI DSS.

SQL implementations

edit

ACL algorithms have been ported to SQL and to relational database systems. Many "modern" (2000s and 2010s) SQL-based systems, like enterprise resource planning and content management systems, have used ACL models in their administration modules.

Schema-indexed ACLs

edit

In 2024, schema-indexed ACL models emerged as a lightweight alternative to traditional JSON-based permission storage. One notable proposal introduced the idea of storing only the indexes of allowed operations, rather than full permission trees. This technique, later formalized as **SCode ACL**, allows compact encoding of access rights (e.g., `"0 2 5"`) based on a predefined flattened schema, making it particularly efficient for use in stateless systems such as JWT tokens or session cookies. The approach gained early traction in developer communities for its minimalism and performance, and has since been adopted in both small-scale and production-grade systems.[citation needed]

Comparing with RBAC

edit

The main alternative to the ACL model is the role-based access-control (RBAC) model. A "minimal RBAC model", RBACm, can be compared with an ACL mechanism, ACLg, where only groups are permitted as entries in the ACL. Barkley (1997)[19] showed that RBACm and ACLg are equivalent.

In modern SQL implementations, ACLs also manage groups and inheritance in a hierarchy of groups. So "modern ACLs" can express all that RBAC express and are notably powerful (compared to "old ACLs") in their ability to express access-control policy in terms of the way in which administrators view organizations.

For data interchange, and for "high-level comparisons", ACL data can be translated to XACML.[20]

See also

edit

Notes

edit
  1. ^ E.g., File-system permissions, permission to perform specific action.

References

edit
  1. ^ R. Shirey (August 2007). Internet Security Glossary, Version 2. doi:10.17487/RFC4949. RFC 4949. Retrieved May 19, 2023.
  2. ^ Richard E. Smith. Elementary Information Security. p. 150.
  3. ^ Daley, R. C.; Neumann, P. G. (1965). "A general-purpose file system for secondary storage". AFIPS '65 (Fall, part I): Proceedings of the November 30--December 1, 1965, fall joint computer conference, part I. ACM Press. p. 213. doi:10.1145/1463891.1463915.
  4. ^ "Managing Authorization and Access Control". Microsoft Learn. 2025-08-07. Retrieved 2025-08-07.
  5. ^ "P.S.I. Pacer Software, Inc. Gnet-II revision 3.0". Communications. Computerworld. Vol. 18, no. 21. 2025-08-07. p. 54. ISSN 0010-4841. Retrieved 2025-08-07. The new version of Gnet-II (revision 3.0) has added a line-security mechanism which is implemented under the Primos ACL subsystem.
  6. ^ Grünbacher, Andreas. "POSIX Access Control Lists on Linux". Usenix. Retrieved 12 December 2019.
  7. ^ wurtzkurdle. "Why was POSIX.1e withdrawn?". Unix StackExchange. Retrieved 12 December 2019.
  8. ^ Trümper, Winfried (February 28, 1999). "Summary about Posix.1e". Archived from the original on 2025-08-07.
  9. ^ "Red Hat Enterprise Linux AS 3 Release Notes (x86 Edition)". Red Hat. 2003. Archived from the original on 2025-08-07. Retrieved 2025-08-07. EA (Extended Attributes) and ACL (Access Control Lists) functionality is now available for ext3 file systems. In addition, ACL functionality is available for NFS.
  10. ^ "NFSv4 ACLs". FreeBSD. 2025-08-07. Retrieved 2025-08-07.
  11. ^ "Chapter 8 Using ACLs and Attributes to Protect ZFS Files". Oracle Corporation. 2025-08-07. Retrieved 2025-08-07.
  12. ^ Grünbacher, Andreas (May 2008). "Native NFSv4 ACLs on Linux". SUSE. Archived from the original on 2025-08-07. Retrieved 2025-08-07.
  13. ^ Grünbacher, Andreas (July–September 2010). "Richacls – Native NFSv4 ACLs on Linux". bestbits.at. Archived from the original on 2025-08-07. Retrieved 2025-08-07.
  14. ^ "ACLs". Linux NFS.
  15. ^ "Mapping Between NFSv4 and Posix Draft ACLs".
  16. ^ "vfs_nfs4acl_xattr(8)". Samba Manual.
  17. ^ "[MS-ADTS]: Active Directory Technical Specification". 7 June 2024.
  18. ^ Swift, Michael M. (November 2002). "Improving the granularity of access control for Windows 2000". ACM Transactions on Information and System Security. 5 (4): 398–437. doi:10.1145/581271.581273. S2CID 10702162.
  19. ^ J. Barkley (1997) "Comparing simple role based access control models and access control lists", In "Proceedings of the second ACM workshop on Role-based access control", pages 127-132.
  20. ^ G. Karjoth, A. Schade and E. Van Herreweghen (2008) "Implementing ACL-based Policies in XACML", In "2008 Annual Computer Security Applications Conference".

Further reading

edit
菌群失调是什么意思 赖氨酸是什么 告诉我们什么道理 腹胀吃什么药 太平间是什么意思
金银花有什么作用 刮痧红色说明什么原因 一什么玉米 激素水平是什么意思 紫色适合什么肤色的人
氟哌噻吨美利曲辛片治什么病 肚子左边是什么部位 繁衍的衍是什么意思 臭氧有什么作用 娇兰属于什么档次
叉烧是什么肉 孕期血糖高可以吃什么水果 特应性皮炎是什么病 蚊虫叮咬涂什么药 晚上八点到九点是什么时辰
魔芋粉是什么做的hcv9jop0ns7r.cn 四肢发达是什么生肖hcv9jop4ns8r.cn 驳是什么动物hcv8jop7ns9r.cn 水代表什么生肖hcv9jop0ns7r.cn 紧急避孕药叫什么名字0735v.com
牙为什么会疼dajiketang.com 倒挂金钩什么意思hcv9jop6ns5r.cn 右眼皮跳代表什么hcv8jop9ns9r.cn 梦见考试是什么预兆hcv8jop5ns6r.cn 舌头长泡吃什么药wuhaiwuya.com
私生子是什么意思hcv8jop3ns1r.cn 梦见手机失而复得是什么意思sanhestory.com 腻了是什么意思sscsqa.com 紫癜是什么引起的hcv9jop3ns0r.cn tim是什么hcv9jop2ns8r.cn
父亲节做什么礼物好hcv8jop9ns3r.cn 黄鼠狼进屋是什么兆头hcv9jop6ns6r.cn 什么人不能吃洋葱hcv9jop6ns8r.cn 箨是什么意思qingzhougame.com 副产品是什么意思hcv8jop7ns7r.cn
百度