DESCRIPTOR MODEL OF ACCESS CONTROL AND MANAGEMENT SYSTEM IN MICROSOFT WINDOWS OPERATING SYSTEMS

Authors

  • Natalia PETLIAK Khmelnytskyi National University https://orcid.org/0000-0001-5971-4428
  • Rastislav TOVT Khmelnytskyi National University
  • Ivan KOBYLIANSKYI Khmelnytskyi National University
  • Volodymyr OLIINYK Khmelnytskyi National University

DOI:

https://doi.org/10.31891/2219-9365-2025-83-49

Keywords:

access control, descriptor model, Windows, ACL, SID, Active Directory, Zero Trust, ISO/IEC 27001, privilege management, information security

Abstract

The article examines the descriptor-based model of access control and management in Windows operating systems, focusing on the formalized description of interactions between subjects and objects under security policies. The study provides an in-depth analysis of the Windows access control architecture, including access tokens, security identifiers (SID), access control lists (ACL), auditing mechanisms, and centralized management via Active Directory. The research identifies current threats, common misconfigurations, and vulnerabilities, while outlining recommendations for improving access control mechanisms in alignment with international information security standards such as ISO/IEC 27001, ISO/IEC 27002, and NIST SP 800-207. The article highlights the importance of adopting context-aware access, the principle of least privilege, Zero Trust architecture, and user behavior analytics to address emerging risks in dynamic IT environments. Special attention is given to domain-based infrastructures, where Group Policy Objects (GPO) and advanced audit configurations enhance centralized governance but also introduce complexity and potential mismanagement risks. The advantages of the descriptor model are emphasized in terms of its suitability for formal verification, automated monitoring, and adaptation to risk-oriented approaches. Directions for future research include the integration of artificial intelligence techniques—particularly behavioral analytics and anomaly detection—into Windows access management, supporting real-time policy adaptation and proactive incident response. Such advancements will enable organizations to align security practices with global standards while ensuring the confidentiality, integrity, and availability of information assets in modern digital ecosystems.

Published

2025-08-28

How to Cite

PETLIAK Н., TOVT Р., KOBYLIANSKYI І., & OLIINYK В. (2025). DESCRIPTOR MODEL OF ACCESS CONTROL AND MANAGEMENT SYSTEM IN MICROSOFT WINDOWS OPERATING SYSTEMS. MEASURING AND COMPUTING DEVICES IN TECHNOLOGICAL PROCESSES, (3), 404–408. https://doi.org/10.31891/2219-9365-2025-83-49