A Linux Implementation of Windows ACLs

Provided by: International Journal of Computer Science and Network Security
Topic: Software
Format: PDF
The file protection methods used within the Linux operating system are based on the traditional flags associated with old-style UNIX systems. The Access Control List (ACL) permissions utilized in more recent additions of Linux are constructed on top of these original permissions, and the result is a confusing blend of the old style and new style file protection mechanisms. When permission settings are confusing to the user, incorrect permission settings are more likely; this leads to vulnerabilities in systems which can then be taken advantage of by adversaries.

Find By Topic