Tag

ACL

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Jun 14, 2025 · Operations

Master Linux File Permissions: UGO, ACL, and chmod/chown Commands Explained

This guide explains Linux’s UGO permission model, the meaning of read/write/execute bits for files and directories, and demonstrates how to manage permissions using chmod, chown, chgrp, as well as advanced ACL techniques including mask and default settings.

ACLFile PermissionsLinux
0 likes · 8 min read
Master Linux File Permissions: UGO, ACL, and chmod/chown Commands Explained
Raymond Ops
Raymond Ops
Jun 13, 2025 · Operations

Master HAProxy: Step-by-Step Deployment and Configuration Guide

This article provides a comprehensive, hands‑on guide to installing HAProxy, configuring global, defaults, listen, frontend, and backend sections, setting up ACL‑based load balancing, preparing backend web servers, testing the setup, and accessing the HAProxy statistics page.

ACLConfigurationHAProxy
0 likes · 16 min read
Master HAProxy: Step-by-Step Deployment and Configuration Guide
Kuaishou Tech
Kuaishou Tech
Jun 5, 2025 · Artificial Intelligence

7 Kuaishou AI Papers Accepted at ACL 2025: Video Understanding & Safe LLM Decoding

Kuaishou’s foundational large-model team has secured seven papers at ACL 2025, spanning alignment bias in training, safety defenses during inference, decoding strategies, fine-grained video-temporal understanding, reward fairness in RLHF, multimodal captioning benchmarks, and methods to curb hallucinations in vision-language models.

ACLAI safetybenchmark
0 likes · 13 min read
7 Kuaishou AI Papers Accepted at ACL 2025: Video Understanding & Safe LLM Decoding
Raymond Ops
Raymond Ops
Jun 4, 2025 · Operations

Mastering SFTP: Complete Planning, Configuration, and High‑Availability Guide

This guide walks you through SFTP server planning, user naming conventions, directory structures, SSH configuration, account creation, permission setup, client usage, log auditing, rotation, connection limits, monitoring, and high‑availability deployment across multiple servers, providing ready‑to‑run commands and scripts.

ACLHigh AvailabilityLinux
0 likes · 14 min read
Mastering SFTP: Complete Planning, Configuration, and High‑Availability Guide
Raymond Ops
Raymond Ops
Apr 19, 2025 · Operations

How to Set Up Transparent and Reverse Proxy with Squid on Linux

This guide walks through installing Squid on Linux, configuring it as a transparent proxy for internal clients, setting up a reverse proxy for external web servers, and applying common ACL rules to control access and improve network performance.

ACLLinuxProxy
0 likes · 11 min read
How to Set Up Transparent and Reverse Proxy with Squid on Linux
Code Ape Tech Column
Code Ape Tech Column
Apr 14, 2025 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical extensions such as role hierarchies, constraints, and real‑world system design considerations for user, role, and permission management.

ACLAccess ControlAuthorization
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Aikesheng Open Source Community
Aikesheng Open Source Community
Jan 7, 2025 · Databases

Analysis of Redis Sentinel Failover Issue in Redis 7.4.0 and Resolution via Pub/Sub ACL Adjustment

This article investigates a Redis Sentinel failover anomaly in version 7.4.0 where the sentinel repeatedly elects a failed master, explains the underlying s_down/o_down states, examines network, configuration, and ACL settings, and resolves the issue by adjusting Pub/Sub permissions to allow proper failover.

ACLFailoverPub/Sub
0 likes · 11 min read
Analysis of Redis Sentinel Failover Issue in Redis 7.4.0 and Resolution via Pub/Sub ACL Adjustment
ByteDance Data Platform
ByteDance Data Platform
Oct 16, 2024 · Databases

How ByteHouse Boosted Sales Data Platform Queries Up to 16× with ACL and Optimizer

This article examines a fast‑growing company's sales data platform, outlines the data‑access pain points caused by ACL permissions, describes the migration from ClickHouse to ByteHouse, details the optimizer’s rule‑based, cost‑based, and distributed‑plan enhancements, and presents benchmark results showing query speedups of up to sixteen times.

ACLByteHouseOLAP
0 likes · 16 min read
How ByteHouse Boosted Sales Data Platform Queries Up to 16× with ACL and Optimizer
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 6, 2024 · Operations

ZooKeeper Core Concepts: Data Model, Node Types, Sessions, Cluster, Election, ZAB, Watch, ACL, and Distributed Lock Patterns

This article explains ZooKeeper's hierarchical data model, node types, session mechanism, cluster roles and election process, ZAB protocol, watch mechanism, ACL permissions, and common distributed lock implementations, providing a comprehensive overview of its core concepts and practical usage.

ACLCluster ManagementCoordination Service
0 likes · 17 min read
ZooKeeper Core Concepts: Data Model, Node Types, Sessions, Cluster, Election, ZAB, Watch, ACL, and Distributed Lock Patterns
Code Ape Tech Column
Code Ape Tech Column
Jan 9, 2024 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the principles, examples, and drawbacks of the five mainstream access‑control models—ACL, DAC, MAC, ABAC, and RBAC—while also detailing RBAC extensions and practical guidelines for designing user, role, and permission management in real‑world systems.

ACLAccess ControlAuthorization
0 likes · 13 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Top Architect
Top Architect
Sep 6, 2023 · Information Security

Design and Implementation of Baidu's Unified Permission Management Service (MPS)

This article details the design and development of Baidu's Unified Permission Management Service (MPS), covering requirements analysis, technology selection, architecture, platform and node management, permission models (RBAC, ACL, DAC), functional modules, API integration, audit, and deployment strategies for enterprise-wide access control.

ACLAccess ControlBackend Development
0 likes · 18 min read
Design and Implementation of Baidu's Unified Permission Management Service (MPS)
Architect
Architect
Sep 4, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article details the design and development of a unified permission management service (MPS) that consolidates RBAC, ACL, and DAC models to solve fragmented enterprise permission issues, covering requirement analysis, technical selection, functional modules, deployment, and performance outcomes.

ACLAccess ControlDAC
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
High Availability Architecture
High Availability Architecture
Aug 28, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article presents a comprehensive design and development of Baidu's Unified Permission Management Service (MPS), detailing its requirement analysis, technical selection, hybrid RBAC/ACL/DAC model, functional modules, implementation specifics, and operational results that demonstrate its effectiveness in consolidating enterprise-wide access control.

ACLAccess ControlBackend Service
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
Baidu Geek Talk
Baidu Geek Talk
Aug 14, 2023 · Information Security

Design and Implementation of Unified Permission Management Service (MPS) at Baidu

Unified Permission Management Service (MPS) at Baidu centralizes fragmented permission systems across internal platforms, integrating ACL, DAC, and RBAC models via Baidu's GDP framework, and provides modules for platform and node management, permission CRUD, workflow approvals, and audit/recovery, now serving over 20,000 users and managing more than 100,000 permission nodes.

ACLAccess ControlBackend Development
0 likes · 16 min read
Design and Implementation of Unified Permission Management Service (MPS) at Baidu
macrozheng
macrozheng
Aug 4, 2022 · Information Security

Mastering Access Control: 5 Core Permission Models Explained

This article introduces the design of permission systems and thoroughly explains the five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—along with their principles, examples, drawbacks, and practical implementation details for real‑world applications.

ACLAccess ControlRBAC
0 likes · 15 min read
Mastering Access Control: 5 Core Permission Models Explained
Code Ape Tech Column
Code Ape Tech Column
Jul 18, 2022 · Information Security

Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC

This article explains the design of permission systems by introducing five major access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical implementation considerations for user, role, and permission management in enterprise applications.

ACLAccess ControlAuthorization
0 likes · 18 min read
Understanding Common Access Control Models: ACL, DAC, MAC, ABAC, and RBAC
Wukong Talks Architecture
Wukong Talks Architecture
May 7, 2022 · Backend Development

Basic Introduction to Apache ZooKeeper: Architecture, Data Model, Sessions, ACLs, and Cluster Mechanisms

This article provides a comprehensive overview of Apache ZooKeeper, covering its ZAB protocol, data model hierarchy, node types, storage mechanisms, watch system, session lifecycle, ACL configurations, serialization with Jute, cluster roles, leader election, log management, and practical use cases such as distributed locks, ID generation, load balancing, and integration with frameworks like Dubbo and Kafka.

ACLClusterDistributed Coordination
0 likes · 46 min read
Basic Introduction to Apache ZooKeeper: Architecture, Data Model, Sessions, ACLs, and Cluster Mechanisms
Youku Technology
Youku Technology
Feb 28, 2022 · Artificial Intelligence

Seq2Path: Generating Sentiment Tuples as Paths of a Tree

Seq2Path treats each sentiment tuple as an independent tree path, training with average path loss and decoding via constrained beam search with a discriminative token, achieving state‑of‑the‑art results on five aspect‑based sentiment analysis datasets and deployment in Alibaba Entertainment AI Brain.

ACLInformation ExtractionNatural Language Processing
0 likes · 3 min read
Seq2Path: Generating Sentiment Tuples as Paths of a Tree
Tencent Cloud Developer
Tencent Cloud Developer
Dec 3, 2021 · Cloud Native

Introducing RoP 0.2.0: Architecture Upgrade and New Features for RocketMQ on Pulsar

The article introduces RoP 0.2.0, a redesign of RocketMQ on Pulsar that eliminates message loss, duplicate consumption, and partial partition consumption, adds ACL authentication, partition expansion for higher throughput, native RocketMQ management APIs, refactors MessageID and routing models, and outlines future features such as tracing, delayed messages, and advanced monitoring.

ACLBrokerMetadataCloudNative
0 likes · 12 min read
Introducing RoP 0.2.0: Architecture Upgrade and New Features for RocketMQ on Pulsar