• In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria (TCSEC)...
    5 KB (563 words) - 14:06, 16 January 2025
  • policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the...
    23 KB (2,601 words) - 13:55, 24 May 2025
  • mandatory access control (MAC) or discretionary access control (DAC). Role-based access control is a policy-neutral access control mechanism defined...
    18 KB (2,197 words) - 19:35, 22 July 2025
  • access control models have included mandatory access control (MAC), discretionary access control (DAC), and more recently role-based access control (RBAC)...
    15 KB (1,827 words) - 22:45, 22 July 2025
  • Thumbnail for Access control
    attributes and environment conditions). Discretionary Access Control (DAC) In DAC, the data owner determines who can access specific resources. For example,...
    51 KB (6,354 words) - 12:52, 8 August 2025
  • implemented differently in systems based on discretionary access control (DAC) and mandatory access control (MAC). Identification and authentication (I&A)...
    19 KB (2,561 words) - 18:21, 21 June 2025
  • Thumbnail for Security-Enhanced Linux
    mechanism operates independently of the traditional Linux (discretionary) access control mechanisms. It has no concept of a "root" superuser, and does...
    36 KB (3,634 words) - 14:26, 4 August 2025
  • context of distribution of discretionary access control (DAC) permissions, for example asserting that giving user U read/write access to file F violates least...
    15 KB (1,761 words) - 17:55, 19 May 2025
  • Bell–LaPadula model (category Computer access control)
    lower security level. The Discretionary Security Property uses an access matrix to specify the discretionary access control. The transfer of information...
    9 KB (1,152 words) - 08:31, 30 April 2025
  • Thumbnail for AppArmor
    AppArmor supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been partially included...
    11 KB (1,054 words) - 23:55, 27 July 2025
  • access control (CBAC) Discretionary access control (DAC) Graph-based access control (GBAC) Mandatory access control (MAC) Organisation-based access control...
    3 KB (339 words) - 12:40, 9 July 2024
  • Access control list Attribute-based access control (ABAC) Discretionary access control (DAC) Graph-based access control (GBAC) Lattice-based access control...
    4 KB (401 words) - 22:04, 30 December 2024
  • or a checksum, cryptographic hash or digital certificate, and discretionary access control information. In Unix-like systems, extended attributes are usually...
    15 KB (1,761 words) - 22:51, 18 July 2025
  • and Value Software, plus CA-Top Secret (security / mainframe discretionary access control). Oral history interview with Sam Wyly. Charles Babbage Institute...
    2 KB (297 words) - 05:21, 14 March 2025
  • access control (MAC) over discretionary access control (DAC). Access clearance is first given to a subject (e.g. process) accessing objects (e.g. files, records...
    5 KB (610 words) - 15:08, 25 January 2022
  • Thumbnail for Organisation-based access control
    Access control list Attribute-Based Access Control (ABAC) Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access control...
    3 KB (292 words) - 16:32, 4 May 2025
  • descriptors contain discretionary access control lists (DACLs) that contain access control entries (ACEs) that grant and deny access to trustees such as...
    10 KB (759 words) - 18:00, 28 July 2025
  • Access control list Attribute-based access control (ABAC) Capability-based security Context-based access control (CBAC) Discretionary access control (DAC)...
    6 KB (776 words) - 02:27, 12 August 2024
  • to access control, or it may be derived from a combination of the three approaches. The non-discretionary approach consolidates all access control under...
    161 KB (18,151 words) - 22:34, 29 July 2025
  • access control (ABAC) Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access control (GBAC) Lattice-based access control...
    6 KB (706 words) - 20:03, 21 December 2024
  • Systems's XTS-400 operating system. Discretionary Access Control – DAC Graham–Denning model Mandatory Access Control – MAC Multilevel security – MLS Security-Enhanced...
    4 KB (576 words) - 22:15, 23 March 2025
  • Thumbnail for Public-key cryptography
    (May 1977). "11: Limitations of End-to-End Encryption". Non-Discretionary Access Control for Decentralized Computing Systems (S.M. thesis). Laboratory...
    40 KB (4,551 words) - 23:23, 28 July 2025
  • Thumbnail for Bash (Unix shell)
    which control how processes may interact with the file. These permissions are user configurable so they're considered a kind of discretionary access control...
    136 KB (12,321 words) - 23:52, 8 August 2025
  • performance. Cacls Capability-based security Discretionary access control Role-based access control "Syntax of Access Control Expressions". MapR Documentation. Retrieved...
    3 KB (373 words) - 09:10, 6 July 2021
  • called following the call of the filter table, allowing any Discretionary Access Control (DAC) rules in the filter table to take effect before any MAC...
    23 KB (2,722 words) - 09:12, 29 April 2025
  • Delegation and Notifications Multi-server Namespace access control lists and discretionary access control Retention Attributions SECINFO_NO_NAME 9P (protocol)...
    24 KB (2,611 words) - 01:40, 7 August 2025
  • Thumbnail for Trusted Computer System Evaluation Criteria
    store and preserve the integrity of access control labels and retain the labels if the object is exported. Discretionary Security Policy – Enforces a consistent...
    18 KB (2,124 words) - 19:40, 25 May 2025
  • Resource Protection (WRP) works by setting discretionary access-control lists (DACLs) and access control lists (ACLs) defined for protected resources...
    11 KB (1,224 words) - 20:03, 26 January 2025
  • Relationship-based access control (ReBAC) Role-based access control (RBAC) Take-grant protection model Discretionary access control (DAC) Security modes Protection mechanism...
    2 KB (184 words) - 14:25, 17 July 2024
  • Thumbnail for Multics
    (Access Isolation Mechanism). This provided mandatory access control which could be enabled to supplement the already existing discretionary access control...
    40 KB (4,508 words) - 19:41, 24 July 2025