Brain Dump

Discretionary Access Control

Tags
security

A form of access control in which the user [see page 3, specifies] who is given what access to what objects they control. Implemented with:

  • passwords
  • capabilities (tickets)
  • owner/group/other masks
  • Access Control Lists

Warn: This approach is vulnerable to trojan horses, however some protection can be made with MAC.

Note: This is a minimum requirement for many military systems and at a high-level is essentially just a [see page 46, military-obsession].

Links to this note