Document Type
Article
Publication Date
4-2000
Publication Title
ACM Operating Systems Review
Department
Department of Computer Science
Abstract
Historically and currently, access control and authentication is managed through ACLs. Examples include:
• the list of users in /etc/password, the NIS passwd map, or an NT domain
• permissions on Unix files or ACLs on NT objects
• a list of known hosts in .ssh/known hosts
• a list of IP addresses in .rhosts (for rsh) or .htaccess (http)
The limitations of ACLs always cause problems when spanning administrative domains (and often even inside administrative domains). The best example is the inability to express transitive sharing. Alice shares read access to object X with Bob (but not access to X’s ACL), and Bob wants to share some of it with Charlie. Bob can share all of it by giving up his identity. He can share part of it by copying it or acting as an “access oracle” to X. All three mechanisms, however, undermine the underlying security model.
DOI
10.1145/346152.346268
Original Citation
Jon Howell and David Kotz. Restricted delegation: seamlessly spanning administrative boundaries. In ACM Operating Systems Review, April 2000. 10.1145/346152.346268
Dartmouth Digital Commons Citation
Howell, Jon and Kotz, David, "Restricted Delegation: Seamlessly Spanning Administrative Boundaries" (2000). Dartmouth Scholarship. 3361.
https://digitalcommons.dartmouth.edu/facoa/3361