The poor usability of OpenLDAP Access Control Lists

نویسندگان

چکیده

The usability of Access Control Lists (ACLs) a widely used enterprise software for directory information services called OpenLDAP is addressed. A service to store variety data such as employee and passwords, can be seen critical infrastructure component an enterprise. Security in particular, access control paramount importance, provides ACLs this purpose that administrator configure. usability, is, the ease with which human express policy ACL, then important issue because misconfigurations are known major cause security vulnerabilities. Motivated by public pronouncements regarding poor ACLs, systematic study towards evaluating their carried out. authors begin cognitive walkthrough, identifies broad issues, informs design ethics-approved 50 participants. This reveals indeed, even limited syntax, adequate training focus only on devising from scratch, suffer usability. gathered analysed further, more detailed observations made those difference difficulty different kinds goals, nature errors participants make ACLs. As such, work makes contribution insights (re)design particular OpenLDAP.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

control of the optical properties of nanoparticles by laser fields

در این پایان نامه، درهمتنیدگی بین یک سیستم نقطه کوانتومی دوگانه(مولکول نقطه کوانتومی) و میدان مورد مطالعه قرار گرفته است. از آنتروپی ون نیومن به عنوان ابزاری برای بررسی درهمتنیدگی بین اتم و میدان استفاده شده و تاثیر پارامترهای مختلف، نظیر تونل زنی(که توسط تغییر ولتاژ ایجاد می شود)، شدت میدان و نسبت دو گسیل خودبخودی بر رفتار درجه درهمتنیدگی سیستم بررسی شده اشت.با تغییر هر یک از این پارامترها، در...

15 صفحه اول

Understanding and Specifying Social Access Control Lists

Online social network (OSN) users upload millions of pieces of content to share with others every day. While a significant portion of this content is benign (and is typically shared with all friends or all OSN users), there are certain pieces of content that are highly privacy sensitive. Sharing such sensitive content raises significant privacy concerns for users, and it becomes important for t...

متن کامل

POSIX Access Control Lists on Linux

This paper discusses file system Access Control Lists as implemented in several UNIX-like operating systems. After recapitulating the concepts of these Access Control Lists that never formally became a POSIX standard, we focus on the different aspects of implementation and use on Linux.

متن کامل

‏‎faciliting lexical access for the fluent production of speech‎‏

‏‎the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis,a one-way anova experimental design was carried out. 24 sednior students of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inter...

15 صفحه اول

Rule Dependencies in Access Control Lists

This paper considers the effects of dependencies between rules in Access Control Lists (ACLs). Dependent rules may not be reordered in an ACL if the policies of the list are to be preserved. This is an obstacle to the optimisation of rule order intended to reduce the time taken matching packets against rules. In this paper, the concept of rule dependency is defined in relation to the problem of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iet Information Security

سال: 2022

ISSN: ['1751-8709', '1751-8717']

DOI: https://doi.org/10.1049/ise2.12079