skip to main content
10.1145/373256.373271acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Improving the granularity of access control in Windows NT

Published:01 May 2001Publication History

ABSTRACT

This paper presents the access control mechanisms in Windows 2000 that enable fine-grained protection and centralized management. These mechanisms were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000. We first extended entries in access control lists to allow rights to apply to just a portion of an object. The second extension allows centralized management of object hierarchies by specifying more precisely how access control lists are inherited. The final extension allows users to limit the rights of executing programs by restricting the set of objects they may access. These changes have the combined effect of allowing centralized management of access control while precisely specifying which accesses are granted to which programs.

References

  1. 1.M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems, 15(4):706--734, Oct. 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.D. Balfanz, and D. Simon, WindowBox: A Simple Security Model for the Connected Desktop. In Proceedings of the 4th USENIX Windows Systems Symposium, Aug. 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.D. Bell and L. LaPadula, Secure Computer System: Unified Exposition and the Multics Interpretation. Technical Report No. ESD-TR-75-306, Electronics Systems Division,AFSC, Manscom AF Base, Bedford, MA, 1976.]]Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.A. Berman, V. Bourassa, and E. Selberg, TRON: Processspecific file protection for the UNIX operating system. In Proceedings of the 1995 USENIX Winter Technical Conference, pages 165-175. Jan. 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.B. Callaghan, B. Pawloski and P. Staubach, NFS Version 3 Protocol Specification. Request for Comments RFC 1813, Internet Engineering Task Force, Jun. 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.Computer Emergency Response Team, CERT Advisory CA-2000- 16 Microsoft 'IE Script'/Access/OBJECT Tag Vulnerability. http://www.cert.org/advisories/CA-2000-16.html, Aug. 2000.]]Google ScholarGoogle Scholar
  7. 7.G. Clemm, A. Hopkins, E. Sedlar and J. Whitehead, WebDAV Access Control Protocol. Internet draft draft-ietf-webdav-acl- 04, Intnernet Engineering Task Force, Jan. 2001.]]Google ScholarGoogle Scholar
  8. 8.D. Denning, A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5), pages 236-243, Aug. 1976.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.T. Dierks and C. Allen, The TLS Protocol. Request for Comments RFC 2246, Internet Engineering Task Force, Jan. 1999.]]Google ScholarGoogle Scholar
  10. 10.I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A Secure Environment for Untrusted Helper Applications --- Confining the Wily Hacker. In Proceedings of the 1996 USENIX Security Symposium.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.J. Kohl and B. C. Neuman. The Kerberos Network Authentication Service (V5). Request for Comments (Proposed Standard) RFC 1510, Internet Engineering Task Force, Sep. 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.J. Kohl, B. C. Neuman, and T. Y. T'so. The Evolution of the Kerberos Authentication System. In Distributed Open Systems, pages 78-94. IEEE Computer Society Press, 1994]]Google ScholarGoogle Scholar
  13. 13.P. J. Leach and R. Salz, UUIDs and GUIDs. Internet Draft draft-leach-uuids-guids-01.txt. Internet Engineering Task Force, Feb. 1998.]]Google ScholarGoogle Scholar
  14. 14.J. Linn, Generic Security Service API, Request For Comments RFC 1508, Internet Engineering Task Force, Sep. 1993.]]Google ScholarGoogle Scholar
  15. 15.D. Mackey and R. Salz, DCE ACL Library - Functional Specification, OSF DCE SIG Request For Comments 46.0, Oct. 1993.]]Google ScholarGoogle Scholar
  16. 16.D. Mazieres and M. F. Kaashoek, Secure Applications Need Flexible Operating Systems. In Proceedings of the 6 th Workshop on Hot Topics in Operating Systems, May 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.Microsoft Corp., Windows 2000 Active Directory, http://www.microsoft.com/widows2000/guide/server/features/ directory.asp, 2000.]]Google ScholarGoogle Scholar
  18. 18.Microsoft Knowledge Base, Large Numbers of ACEs in ACLs Impair Directory Service Performance, http://support.microsoft.com/support/kb/articles/q271/8/76.asp, 2000.]]Google ScholarGoogle Scholar
  19. 19.Microsoft Corp., Distributed Component Object Model. http://www.microsoft.com/com/tech/dcom.asp, 1998.]]Google ScholarGoogle Scholar
  20. 20.Microsoft Corp., ActiveX Controls, http://microsoft.com/ com/tech/activex.asp, 1999.]]Google ScholarGoogle Scholar
  21. 21.Novell Inc., NDS 8. http://www.novell.com/documentation/ lg/nds8/docui/index.html, 1999.]]Google ScholarGoogle Scholar
  22. 22.D. Ritchie, and K. Thompson, The UNIX Timesharing System. Communications of the ACM, 17(7), pages 365-375, Jul. 1974.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.J. Saltzer and M. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE 63(9), pages 1278-1308, Sep. 1975.]]Google ScholarGoogle Scholar
  24. 24.R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role- Based Access Control Models. IEEE Computer, 29(2) pages 38- 47, Feb. 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.M. Swift, J. Trostle, J. Brezak and B. Gossman, Kerberos Set/Change Password: Version 2, Internet Draft draft-ietf-catkerberos-set-passwd-03 Internet Engineering Task Force, Apr. 2000.]]Google ScholarGoogle Scholar
  26. 26.K. Walker, D. Sterne, M. Badger, M. Petkac, D. Shermann, and K. Oostendorp, Confining Root Programs with Domain and Type Enforcement (DTE). In Proceedings of the 6 th USENIX Security Symposium, Jul. 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27.Q. Zhong, Providing Secure Environments for Untrusted Network Applications. In Proceedings of the 2 nd IEEE International Workshop on Enterprise Security, Jun. 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Improving the granularity of access control in Windows NT

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies
            May 2001
            181 pages
            ISBN:1581133502
            DOI:10.1145/373256

            Copyright © 2001 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 May 2001

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate177of597submissions,30%

            Upcoming Conference

            SACMAT 2024

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader