An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation. For instance, if a file has an ACL that contains (Alice, delete), this would give Alice permission to delete the file.
Read more about Access Control List: ACL-based Security Models, Filesystem ACLs, Networking ACLs
Famous quotes containing the words access, control and/or list:
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)
“The glance is natural magic. The mysterious communication established across a house between two entire strangers, moves all the springs of wonder. The communication by the glance is in the greatest part not subject to the control of the will. It is the bodily symbol of identity with nature. We look into the eyes to know if this other form is another self, and the eyes will not lie, but make a faithful confession what inhabitant is there.”
—Ralph Waldo Emerson (18031882)
“Religious literature has eminent examples, and if we run over our private list of poets, critics, philanthropists and philosophers, we shall find them infected with this dropsy and elephantiasis, which we ought to have tapped.”
—Ralph Waldo Emerson (18031882)