期刊文献+

A new formal model for privilege control with supporting POSIX capability mechanism 被引量:3

A new formal model for privilege control with supporting POSIX capability mechanism
原文传递
导出
出处 《Science in China(Series F)》 2005年第1期46-66,共21页 中国科学(F辑英文版)
基金 supported by the National Key Basic Research Program of China(Grant No.G1999035802) the National Natural Science Foundation of China(Grant No.60083007)
关键词 formal model least privilege ROLE DOMAIN capability. formal model, least privilege, role, domain, capability.
  • 相关文献

参考文献25

  • 1[1]Curry, D. A., Improving the security of your UNIX system, Technology report ITSTD-721-FR-90-21, SRI International, April 1990.
  • 2[2]IBM server group, Addressing secrity issues in Linux, A Linux White Paper, 2000.
  • 3[3]Data General, Managing security on DG/UX system, manual 093-701138-04, Data General Corporation, Westboro, MA01580, Nov. 1996.
  • 4[4]Cowan, C., Beattie, S., Kroach-Hartman, G. et al., SubDomain: parsimonious server security, 14th USENIX Systems Administration Conference (LISA 2000), New Orleans, LA, December 2000.
  • 5[5]Chandramouli, R., A framework for multiple authorization types in a healthcare application system, in Proc.17th Annual Computer Security Applications Conference, December 2001,137-148.
  • 6[6]Hoffman, J., Implementing RBAC on a type enforced system, In Proc. 13th Annual Computer Security Applications Conference, December 1997, 158-163.
  • 7[7]Sandhu, R.S., Coyne, E. J., Feinstein, H. L. et al., Role based access control models, IEEE Computer, February 1996, 29(2): 38-47.
  • 8[8]Ferraiolo, D. F., Sandhu, R., Gavrila, S. et al., Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, August 2001, 4(3): 224-274.
  • 9[9]Dalton, C., Choo, T. H., An operating system approach to securing e-services, Communication of the ACM,2001, 44(2): 58-66.
  • 10[10]Baldwin, R. W., Naming and grouping privileges to simplify security management in large database, in Proceedings of IEEE Symposium on Security and Privacy, 1990, 116-132.

同被引文献4

引证文献3

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部