<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://50.77.162.165/mediawiki/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://50.77.162.165/mediawiki/index.php?feed=atom&amp;target=Clandau&amp;title=Special%3AContributions</id>
		<title>Erights - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://50.77.162.165/mediawiki/index.php?feed=atom&amp;target=Clandau&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://50.77.162.165/wiki/Special:Contributions/Clandau"/>
		<updated>2026-04-25T20:22:37Z</updated>
		<subtitle>From Erights</subtitle>
		<generator>MediaWiki 1.15.5-7</generator>

	<entry>
		<id>http://50.77.162.165/wiki/Ambient_authority</id>
		<title>Ambient authority</title>
		<link rel="alternate" type="text/html" href="http://50.77.162.165/wiki/Ambient_authority"/>
				<updated>2009-06-11T23:04:31Z</updated>
		
		<summary type="html">&lt;p&gt;Clandau:&amp;#32;Restore credit to coiners&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Draft Definition ==&lt;br /&gt;
&lt;br /&gt;
A [[subject]] may have several different [[permission]]s. '''Ambient authority''' is authority that can be used without having to identify which specific permission is required. In an ambient authority system, when a subject requests an action (typically by naming an object and an operation on that object), the action is allowed if the subject has any permission for the action. &lt;br /&gt;
&lt;br /&gt;
In contrast, in a designated authority system, a subject explicitly identifies a subset (usually one) of its permissions, and the action is allowed only if permitted by that subset of permissions. &lt;br /&gt;
&lt;br /&gt;
In an ambient authority system, often there is no way to identify a specific permission, so there is no concept of having different permissions. &lt;br /&gt;
&lt;br /&gt;
== Comment ==&lt;br /&gt;
&lt;br /&gt;
Several access control models were invented and implemented to enable restriction of ambient authority of subjects. Many of them are:&lt;br /&gt;
* either weak (we cannot follow the [[POLA|principle of least authority]])&lt;br /&gt;
* or convoluted (it is hard to learn how to work with this model and be sure about [[authority]] of subjects).&lt;br /&gt;
Things become more &amp;quot;interesting&amp;quot; if we have to consider different security policies enforced via different alternative security mechanisms for the same type of objects and for different type of objects and the relevant transitivity relationship.&lt;br /&gt;
&lt;br /&gt;
== Examples of ambient authority ==&lt;br /&gt;
&lt;br /&gt;
All UNIX processes run by some user have ''ambient authority'' to manipulate all files owned by that user.&lt;br /&gt;
&lt;br /&gt;
All UNIX processes have ''ambient authority'' to listen to TCP or UDP ports 1024--65535.&lt;br /&gt;
&lt;br /&gt;
All UNIX processes have ''ambient authority'' to send any signal to any other UNIX process.&lt;br /&gt;
&lt;br /&gt;
== Acknowledgement ==&lt;br /&gt;
&lt;br /&gt;
The term ''ambient authority'' was coined by Dean Tribble and Mark S. Miller.&lt;/div&gt;</summary>
		<author><name>Clandau</name></author>	</entry>

	<entry>
		<id>http://50.77.162.165/wiki/Ambient_authority</id>
		<title>Ambient authority</title>
		<link rel="alternate" type="text/html" href="http://50.77.162.165/wiki/Ambient_authority"/>
				<updated>2009-06-11T22:04:40Z</updated>
		
		<summary type="html">&lt;p&gt;Clandau:&amp;#32;Completely replace the definition&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Draft Definition ==&lt;br /&gt;
&lt;br /&gt;
A [[subject]] may have several different [[permission]]s. '''Ambient authority''' is authority that can be used without having to identify which specific permission is required. In an ambient authority system, when a subject requests an action (typically by naming an object and an operation on that object), the action is allowed if the subject has any permission for the action. &lt;br /&gt;
&lt;br /&gt;
In contrast, in a designated authority system, a subject explicitly identifies a subset (usually one) of its permissions, and the action is allowed only if permitted by that subset of permissions. &lt;br /&gt;
&lt;br /&gt;
In an ambient authority system, often there is no way to identify a specific permission, so there is no concept of having different permissions. &lt;br /&gt;
&lt;br /&gt;
== Comment ==&lt;br /&gt;
&lt;br /&gt;
Several access control models were invented and implemented to enable restriction of ambient authority of subjects. Many of them are:&lt;br /&gt;
* either weak (we cannot follow the [[POLA|principle of least authority]])&lt;br /&gt;
* or convoluted (it is hard to learn how to work with this model and be sure about [[authority]] of subjects).&lt;br /&gt;
Things become more &amp;quot;interesting&amp;quot; if we have to consider different security policies enforced via different alternative security mechanisms for the same type of objects and for different type of objects and the relevant transitivity relationship.&lt;br /&gt;
&lt;br /&gt;
== Examples of ambient authority ==&lt;br /&gt;
&lt;br /&gt;
All UNIX processes run by some user have ''ambient authority'' to manipulate all files owned by that user.&lt;br /&gt;
&lt;br /&gt;
All UNIX processes have ''ambient authority'' to listen to TCP or UDP ports 1024--65535.&lt;br /&gt;
&lt;br /&gt;
All UNIX processes have ''ambient authority'' to send any signal to any other UNIX process.&lt;/div&gt;</summary>
		<author><name>Clandau</name></author>	</entry>

	</feed>