In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria (TCSEC)...
5 KB (563 words) - 14:06, 16 January 2025
policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the...
23 KB (2,601 words) - 13:55, 24 May 2025
mandatory access control (MAC) or discretionary access control (DAC). Role-based access control is a policy-neutral access control mechanism defined...
18 KB (2,197 words) - 19:35, 22 July 2025
access control models have included mandatory access control (MAC), discretionary access control (DAC), and more recently role-based access control (RBAC)...
15 KB (1,827 words) - 22:45, 22 July 2025
attributes and environment conditions). Discretionary Access Control (DAC) In DAC, the data owner determines who can access specific resources. For example,...
51 KB (6,354 words) - 12:52, 8 August 2025
implemented differently in systems based on discretionary access control (DAC) and mandatory access control (MAC). Identification and authentication (I&A)...
19 KB (2,561 words) - 18:21, 21 June 2025
Security-Enhanced Linux (redirect from Access vector cache)
mechanism operates independently of the traditional Linux (discretionary) access control mechanisms. It has no concept of a "root" superuser, and does...
36 KB (3,634 words) - 14:26, 4 August 2025
Principle of least privilege (redirect from Least user access)
context of distribution of discretionary access control (DAC) permissions, for example asserting that giving user U read/write access to file F violates least...
15 KB (1,761 words) - 17:55, 19 May 2025
Bell–LaPadula model (category Computer access control)
lower security level. The Discretionary Security Property uses an access matrix to specify the discretionary access control. The transfer of information...
9 KB (1,152 words) - 08:31, 30 April 2025
AppArmor supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been partially included...
11 KB (1,054 words) - 23:55, 27 July 2025
access control (CBAC) Discretionary access control (DAC) Graph-based access control (GBAC) Mandatory access control (MAC) Organisation-based access control...
3 KB (339 words) - 12:40, 9 July 2024
Access control list Attribute-based access control (ABAC) Discretionary access control (DAC) Graph-based access control (GBAC) Lattice-based access control...
4 KB (401 words) - 22:04, 30 December 2024
or a checksum, cryptographic hash or digital certificate, and discretionary access control information. In Unix-like systems, extended attributes are usually...
15 KB (1,761 words) - 22:51, 18 July 2025
and Value Software, plus CA-Top Secret (security / mainframe discretionary access control). Oral history interview with Sam Wyly. Charles Babbage Institute...
2 KB (297 words) - 05:21, 14 March 2025
Type enforcement (section Control)
access control (MAC) over discretionary access control (DAC). Access clearance is first given to a subject (e.g. process) accessing objects (e.g. files, records...
5 KB (610 words) - 15:08, 25 January 2022
Access control list Attribute-Based Access Control (ABAC) Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access control...
3 KB (292 words) - 16:32, 4 May 2025
descriptors contain discretionary access control lists (DACLs) that contain access control entries (ACEs) that grant and deny access to trustees such as...
10 KB (759 words) - 18:00, 28 July 2025
Access control list Attribute-based access control (ABAC) Capability-based security Context-based access control (CBAC) Discretionary access control (DAC)...
6 KB (776 words) - 02:27, 12 August 2024
Information security (section Access control)
to access control, or it may be derived from a combination of the three approaches. The non-discretionary approach consolidates all access control under...
161 KB (18,151 words) - 22:34, 29 July 2025
RSBAC (redirect from Rule-set-based access control)
access control (ABAC) Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access control (GBAC) Lattice-based access control...
6 KB (706 words) - 20:03, 21 December 2024
Systems's XTS-400 operating system. Discretionary Access Control – DAC Graham–Denning model Mandatory Access Control – MAC Multilevel security – MLS Security-Enhanced...
4 KB (576 words) - 22:15, 23 March 2025
(May 1977). "11: Limitations of End-to-End Encryption". Non-Discretionary Access Control for Decentralized Computing Systems (S.M. thesis). Laboratory...
40 KB (4,551 words) - 23:23, 28 July 2025
Bash (Unix shell) (section Job control)
which control how processes may interact with the file. These permissions are user configurable so they're considered a kind of discretionary access control...
136 KB (12,321 words) - 23:52, 8 August 2025
performance. Cacls Capability-based security Discretionary access control Role-based access control "Syntax of Access Control Expressions". MapR Documentation. Retrieved...
3 KB (373 words) - 09:10, 6 July 2021
called following the call of the filter table, allowing any Discretionary Access Control (DAC) rules in the filter table to take effect before any MAC...
23 KB (2,722 words) - 09:12, 29 April 2025
Delegation and Notifications Multi-server Namespace access control lists and discretionary access control Retention Attributions SECINFO_NO_NAME 9P (protocol)...
24 KB (2,611 words) - 01:40, 7 August 2025
store and preserve the integrity of access control labels and retain the labels if the object is exported. Discretionary Security Policy – Enforces a consistent...
18 KB (2,124 words) - 19:40, 25 May 2025
Resource Protection (WRP) works by setting discretionary access-control lists (DACLs) and access control lists (ACLs) defined for protected resources...
11 KB (1,224 words) - 20:03, 26 January 2025
Relationship-based access control (ReBAC) Role-based access control (RBAC) Take-grant protection model Discretionary access control (DAC) Security modes Protection mechanism...
2 KB (184 words) - 14:25, 17 July 2024
Multics (section File and directory access commands)
(Access Isolation Mechanism). This provided mandatory access control which could be enabled to supplement the already existing discretionary access control...
40 KB (4,508 words) - 19:41, 24 July 2025