Topic: security by capabilities
Topic: security by access rights
Quotation Skeleton
The two basic access-control approaches--capabilities and access lists--differ … [of which users have access to which objects]. … Access lists [stored with the object] do not easily accommodate changes … a number of access lists. With capability systems … [stored in user directories], the revocation …
Google-1Google-2
Copyright clearance needed for quotation.
Additional Titles
Quote: access lists are stored with an object; difficult to add users since may require modification of many lists
Related Topics
Topic: security by capabilities (65 items)
Topic: security by access rights (36 items)