Artwork

Content provided by Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 83: Access Control Lists and Capability Tables

10:57
 
Share
 

Manage episode 490277325 series 3673170
Content provided by Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Access control mechanisms determine who can access what—and how. In this episode, we compare two classic models: Access Control Lists (ACLs) and capability tables. ACLs associate permissions with objects, while capability tables associate them with subjects. We examine their strengths, limitations, and real-world implementations in file systems, network devices, and operating systems. You’ll also learn about how these mechanisms enforce discretionary and mandatory access controls, and how they can be extended using role or attribute-based models. Understanding these concepts is essential for effective system authorization design.

  continue reading

137 episodes

Artwork
iconShare
 
Manage episode 490277325 series 3673170
Content provided by Jason Edwards and Dr. Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr. Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Access control mechanisms determine who can access what—and how. In this episode, we compare two classic models: Access Control Lists (ACLs) and capability tables. ACLs associate permissions with objects, while capability tables associate them with subjects. We examine their strengths, limitations, and real-world implementations in file systems, network devices, and operating systems. You’ll also learn about how these mechanisms enforce discretionary and mandatory access controls, and how they can be extended using role or attribute-based models. Understanding these concepts is essential for effective system authorization design.

  continue reading

137 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play