Improving the granularity of access control for Windows 2000
- 1 November 2002
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 5 (4) , 398-437
- https://doi.org/10.1145/581271.581273
Abstract
This article presents the mechanisms in Windows 2000 that enable fine-grained and centrally managed access control for both operating system components and applications. These features were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000, and to protect computers connected to the Internet. While the access control mechanisms in Windows NT are suitable for file systems and applications with simple requirements, they fall short of the needs of applications with complex data objects. Our goal was to use operating system access control mechanisms to protect a large object hierarchy with many types of objects, each with many data properties. We also wanted to reduce the exposure of users to untrustworthy or exploited programs.We introduced three extensions to support these goals. First, we extended the entries in access control lists to provide an unlimited number of access rights for a single object and to allow grouping those rights for efficiency. Second, we extended the entries to specify precisely how access control lists are assigned to each distinct type of object, instead of treating all types identically. Finally, we extended the data structure identifying users' identity to the operating system to allow users to restrict the set of objects a program may access. These changes allow a single access control mechanism to be used to protect both system and application resources, as well as protect users from each other and users from their programs, simplifying both program development and system management.Keywords
This publication has 10 references indexed in Scilit:
- The TLS Protocol Version 1.0Published by RFC Editor ,1999
- Role-based access control modelsComputer, 1996
- NFS Version 3 Protocol SpecificationPublished by RFC Editor ,1995
- Lightweight Directory Access ProtocolPublished by RFC Editor ,1995
- A calculus for access control in distributed systemsACM Transactions on Programming Languages and Systems, 1993
- Specifying discretionary access control policy for distributed systemsComputer Communications, 1990
- Integrating security in a large distributed systemACM Transactions on Computer Systems, 1989
- A lattice model of secure information flowCommunications of the ACM, 1976
- The protection of information in computer systemsProceedings of the IEEE, 1975
- The UNIX time-sharing systemCommunications of the ACM, 1974