An Access Control List (ACL) is used for access control to a specific resource (e.g., files, devices, systems or physical spaces), to specify which users have been granted access to the resource and under what conditions. An ACL administrator, who will manage the permissions to ensure that only authorised users gain access to the resource, is usually empowered to add or remove permissions and to monitor activity to detect security and/or privacy breaches.
Gollmann, D., 2010. Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544–54, https://doi.org/10.1002/wics.106.
Gollmann, D., 2010. Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544–54, https://doi.org/10.1002/wics.106.