dc.contributor.advisor | Burgess, Mark | |
dc.contributor.author | Madar, Fatima Ali | |
dc.date.accessioned | 2010-11-11T14:15:18Z | |
dc.date.available | 2010-11-11T14:15:18Z | |
dc.date.issued | 2005 | |
dc.identifier.uri | https://hdl.handle.net/10642/521 | |
dc.description | Master i nettverks- og systemadministrasjon | en_US |
dc.description.abstract | This thesis discusses two implementations of file access controls: the UNIX Permissions (UP)
and the Access Control List (ACL).
We will evaluate advantages and weaknesses in these two implementations. The criteria of
evaluation are usefulness, security and manageability. The level of usefulness of systems was
measured by evaluating user-surveys. The level of security was measured by comparing the
implementations against well-established file access control models concerning privacy,
integrity, authentication and trust. Manageability was measured by comparing the
implementations against a manageability model developed from the field of Human-
Computer-interactions. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Høgskolen i Oslo. Avdeling for ingeniørutdanning | en_US |
dc.publisher | Universitetet i Oslo | en_US |
dc.subject | File access control | en_US |
dc.subject | Human-computer interaction | en_US |
dc.subject | Implementations | en_US |
dc.subject | UNIX | en_US |
dc.subject | ACL | en_US |
dc.subject | Access Control List | en_US |
dc.subject | VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Datateknologi: 551 | en_US |
dc.title | Evaluation of file access control implementations | en_US |
dc.type | Master thesis | en_US |