[go: up one dir, main page]

Gamble, 1993 - Google Patents

Implementing Execution Controls in Unix.

Gamble, 1993

View PDF
Document ID
18169253420429901220
Author
Gamble T
Publication year
Publication venue
LISA

External Links

Snippet

Current implementations of UNIX offer security features in the form of discretionary access controls (DACs). DACs are implemented with file access permissions and access control lists (ACLs). Unfortunately, neither of these facilities provide for access control to active …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system

Similar Documents

Publication Publication Date Title
US6243816B1 (en) Single sign-on (SSO) mechanism personal key manager
US8015563B2 (en) Managing virtual machines with system-wide policies
Yoder et al. Architectural patterns for enabling application security
US5347578A (en) Computer system security
US6144959A (en) System and method for managing user accounts in a communication network
US20020073320A1 (en) Aggregated authenticated identity apparatus for and method therefor
US20080109898A1 (en) Modular enterprise authorization solution
JP2000207363A (en) User access controller
Swift et al. Improving the granularity of access control for windows 2000
Gamble Implementing Execution Controls in Unix.
Bunch The setuid feature in Unix and security
Ahn Role-based access control in DCOM
Leahu et al. Access Control Design and Implementations in the ATLAS Experiment
Ott The role compatibility security model
Pereira et al. Managing role-based access control policies for grid databases in OGSA-DAI using CAS
Benantar et al. Access control systems: From host-centric to network-centric computing
Kolano Mesh: secure, lightweight grid middleware using existing SSH infrastructure
Bishop Collaboration using roles
Cortes Active Directory security: Why we fail and what auditors miss
Maly et al. A privilege management system for a secure network
Ferle Account Access and Security
Benantar et al. Use of DSOM before/after metaclass for enabling object access control
Snowberger et al. Sub-Identities: Toward Operating System Support for Distributed System Security
Clark et al. Execution Policies Research and Implementation
Maly et al. A privilege management and enforcement system for distributed resource sharing