Show simple item record

dc.contributor.advisorBurgess, Mark
dc.contributor.authorMadar, Fatima Ali
dc.date.accessioned2010-11-11T14:15:18Z
dc.date.available2010-11-11T14:15:18Z
dc.date.issued2005
dc.identifier.urihttps://hdl.handle.net/10642/521
dc.descriptionMaster i nettverks- og systemadministrasjonen_US
dc.description.abstractThis thesis discusses two implementations of file access controls: the UNIX Permissions (UP) and the Access Control List (ACL). We will evaluate advantages and weaknesses in these two implementations. The criteria of evaluation are usefulness, security and manageability. The level of usefulness of systems was measured by evaluating user-surveys. The level of security was measured by comparing the implementations against well-established file access control models concerning privacy, integrity, authentication and trust. Manageability was measured by comparing the implementations against a manageability model developed from the field of Human- Computer-interactions.en_US
dc.language.isoengen_US
dc.publisherHøgskolen i Oslo. Avdeling for ingeniørutdanningen_US
dc.publisherUniversitetet i Osloen_US
dc.subjectFile access controlen_US
dc.subjectHuman-computer interactionen_US
dc.subjectImplementationsen_US
dc.subjectUNIXen_US
dc.subjectACLen_US
dc.subjectAccess Control Listen_US
dc.subjectVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Datateknologi: 551en_US
dc.titleEvaluation of file access control implementationsen_US
dc.typeMaster thesisen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record