Discretionary Access Control
- Tags
- security
A form of access control in which the user [see page 3, specifies] who is given what access to what objects they control. Implemented with:
- passwords
- capabilities (tickets)
- owner/group/other masks
- Access Control Lists
Warn: This approach is vulnerable to trojan horses, however some protection can be made with MAC.
Note: This is a minimum requirement for many military systems and at a high-level is essentially just a [see page 46, military-obsession].