Related Concepts
Definition
Permissions specify rights for users or groups of users to access resources in different ways. Operating systems utilize file system permissions for data-oriented access control.
Background
The development of multi-programming and multi-user environments necessitated a mechanism for controlling access in file systems. Daley and Neumann described an early, general purpose file system that included access control lists (ACLs) in the form of sets of attributes associated with each user and file that resemble the fundamentals of permissions in many modern operating systems [1]. The scheme was based on “usage attributes” which were Boolean values that indicated whether or not a particular user was allowed to READ from, WRITE to, APPEND to, and EXECUTE the file.
A somewhat simpler permissions scheme became popular as the...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Microsoft, Encarta, MSN, and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Recommended Reading
Daley R, Neumann P (1965) A general-purpose file system for secondary storage. In: Proceedings of the AFIPS Fall Joint Computer Conference. ACM, New York, NY, pp 213–229
Bach M (1986) The design of the UNIX operating system. Prentice-Hall, Englewood Cliffs
McKusick M (1984) A fast file system for UNIX. ACM Trans Comput Syst 2(6):181–197
Reichel R (1993) Inside Windows NT Security. Windows/DOS Developers Journal 4(4):6–19
Russinovich M, Solomon D (2009) Windows internals, 5th edn. Microsoft Press, Redmond
Eriksen M, Fields JB (2005) Mapping Between NFSv4 and Posix Draft ACLs. http://tools.ietf.org/html/draft-ietf-nfsv4-acl-mapping-03∖#page-5. Accessed 5 Oct 2010
Shepler S et al (2003) Network File System (NFS) version 4 Protocol, The Internet Engineering Task Force. http://www.ietf.org/rfc/rfc3530.txt. Accessed 5 Oct 2010
Viega J, McGraw G (2002) Building secure software. Addison-Wesley, Boston
Thompson K, Ritchie DM (1971) UNIX Programmer’s Manual. http://cm.bell-labs.com/cm/cs/who/dmr/1stEdman.html. Accessed 24 Sep 2010
Oracle Solaris 10 (2010) System administration guide: security services. http://docs.sun.com/app/docs/doc/816-4557?l=en. Accessed 20 Sept 2010
How to use CACLS.EXE in a Batch File, Feb 2007. http://support.microsoft.com/kb/135268/. Accessed 5 Oct 2010
How to use Xcacls.exe to modify NTFS permissions, Mar 2007. http://support.microsoft.com/kb/318754. Accessed 5 Oct 2010
The Icacls.exe utility is available for Windows Server 2003 with Service Pack 2, Oct 2007. http://support.microsoft.com/kb/919240. Accessed 5 Oct 2010
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Horne, D. (2011). Permissions. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_786
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_786
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering