Windows的安全模型
来源:互联网 发布:武汉网络营销策划 编辑:程序博客网 时间:2024/06/05 07:38
To understand how it works, one needs a basic understanding of the Windows security model. With this model all processes have an access token. This access token is like an ID card, it contains information about the owner of the process, the list of groups that it belongs to and a list of privileges. Each process has its own token, and the system uses it to deny or grant access to resources.
These resources are called securable objects. They are securable because they are associated with an access control list, or security descriptor. It contains the security settings of the object. The list of all the users and groups having access to the resource, and what kind of access they have (read, write, execute, etc) can be found there. Files, registry keys, mutexes, pipes, events, semaphores are examples of securable objects.
The access check is the mechanism by which the system determines whether the security descriptor of an object grants the rights requested to an access token. It is performed every time a process tries to acquire a securable object.
In Windows, code cannot perform any form of I/O (be it disk, keyboard, or screen) without making a system call. In most system calls, Windows performs some sort of security check.
- Windows的安全模型
- Windows 安全模型
- windows 安全模型简介
- windows 安全模型简介
- Windows 安全模型与用户帐户控制
- windows安全控制模型等资料收集
- windows安全模型--令牌(token)和安全描述符
- windows安全模型--令牌(token)和安全描述符
- windows安全模型--令牌(token)和安全描述符
- Windows 安全模型:每个驱动程序作者都需要了解的内容
- Windows 安全模型:每个驱动程序作者都需要了解的内容
- SQL Server的安全模型
- SQL Server的安全模型
- SQL Server的安全模型
- SQL Server的安全模型
- windows 访问控制模型(二)之安全描述符
- windows服务的安全风险
- 虚拟主机的安全--- windows(转贴)
- Linux下阅读源代码:(g)vim+Taglist+ctags
- 两岸网民习惯管窥
- DevExpress控件汉化
- Chrome浏览器,就是我所需要的浏览器
- 郎咸平 四个大凉是什么
- Windows的安全模型
- 滞涨带给我们什么?
- 使用C++ Builder修改某系统的总结
- 开博前喷一下!
- 纯CSS搞定按钮、链接点击时的虚线 详细出处参考:http://www.jb51.net/css/21479.html
- Java之多线程的概念----TOP10
- android UI SeekBar
- 指令集通俗解释
- 如何将场测的部分 MMS,SMS 本地复现