Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Security objects and Parameters Issues in Windows and Linux

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 47 - Number 25
Year of Publication: 2012
Authors:
Sanjay Kumar Anand
Sudesh Kumar Prajapat
10.5120/7536-0463

Sanjay Kumar Anand and Sudesh Kumar Prajapat. Article: Security objects and Parameters Issues in Windows and Linux. International Journal of Computer Applications 47(25):20-23, June 2012. Full text available. BibTeX

@article{key:article,
	author = {Sanjay Kumar Anand and Sudesh Kumar Prajapat},
	title = {Article: Security objects and Parameters Issues in Windows and Linux},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {47},
	number = {25},
	pages = {20-23},
	month = {June},
	note = {Full text available}
}

Abstract

In any operating system, various objects are existed which are graphically shown to the users on his/her operating system. Each object has a security attributes that identifies its access control list. This list has an entry for each system user with access privileges. Reading the files (or all the files in a directory), writing the file or files and execute the file or files (if it is an executable file, or program) are most common privileges included. Thus, an Access Control List (ACL) is a table that tells a computer which user has to given the access rights for a particular system object, such as a file directory or individual file. Each operating system uses the access control list but in different manner. Linux operating system is based on the POSIX ACL and Windows O/S (Microsoft Windows NT/2000) is based on the ACL. This paper presents the analysis of Linux POSIX ACL and the Windows ACL, based on the various parameters.

References

  • Andreas Grünbache, 2003. Known Problems and Bugs in the Linux EA and ACL implementations. March 20, http://acl. bestbits. at/problems. html.
  • Andreas Grünbacher, 2003, Preserving ACLs and EAs in editors and file managers. February 18, http://www. suse. de/~agruen/ea-acl-copy/ for a description.
  • Hewlett-Packard: acl (2): Set a file's Access Control List (ACL) information. HP-UXReference. http://docs. hp. com/.
  • Microsoft Platform SDK: Access Control Lists. http://msdn. microsoft. com/.
  • Robert N. M. Watson: acl(3): Introduction to the POSIX. 1e ACL security API. FreeBSD Library Functions Manual. http://www. FreeBSD. org/.
  • IEEE Std 1003. 1-2001 (Open Group Technical Standard, Issue 6), Standard for Information Technology--Portable Operating System Interface (POSIX) 2001. ISBN 0-7381-3010-9, http://www. ieee. org/.
  • IEEE 1003. 1e and 1003. 2c: Draft Standard for Information Technology--Portable Operating System Interface (POSIX)--Part 1: System Application Program Interface (API) and Part 2: Shell and Utilities, draft 17 (withdrawn). October 1997. http://wt. xpilot. org/publications/posix. 1e/.
  • Andreas Grünbacher SuSE Labs, SuSE Linux AG Nuremberg, Germany -POSIX Access Control ists on Linux. http://www. suse. de/~agruen/acl/linux-acls/online/.
  • Iseminger, D. 2000. Active Directory Services for Microsoft Windows 2000 Technical Reference. Microsoft Press.
  • IEEE Std 1003. 1 (2004 ed. ), Unix. org, retrieved 2009-07-26.
  • "The Open Group announces completion of the joint revision to POSIX and the Single UNIX Specification" (Press release). The Open Group. January 30, 2002, Retrieved 2009-07-26.
  • POSIX. 1-2008, the Open Group.
  • Native NFSv4 ACLs on Linux. Suse. de. Retrieved 2010-05-04.
  • Richacls - Native NFSv4 ACLs on Linux, bestbits. at. 2011-09-01. Retrieved 2011-01-04.
  • Hollingworth, D. ; Redmond, T. ; Rice, R. DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00. Proceedings Volume: 1 Digital Object Identifier: 10. 1109/DISCEX. 2000. 825035 Publication Year: 2000, Page(s): 320 - 334 vol. 1.
  • Jihong Song; Guiying Hu; QuanSheng Xu Management and Service Science, 2009. MASS '09. International Conference on Digital Object Identifier: 10. 1109/ICMSS. 2009. 5302077Publication Year: 2009 , Page(s): 1 – 4.
  • Hyang-Chang Choi, Yong-Hoon Yi, Jae-Hyun Seo, Bong-Nam Noh, and Hyung-Hyo Lee, "A Privacy Protection Model in ID Management Using Access Control", O. Gervasi et al. (Eds. ): ICCSA 2005, LNCS 3481