期刊文献+

Design and Implementation of Linux Access Control Model

Design and Implementation of Linux Access Control Model
下载PDF
导出
摘要 In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file. In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.
出处 《Meteorological and Environmental Research》 CAS 2017年第4期81-83,共3页 气象与环境研究(英文版)
关键词 ROLE BASED ACCESS CONTROL LINUX RBAC Role based Access control Linux RBAC
  • 相关文献

参考文献4

二级参考文献25

  • 1陈伟鹤,殷新春,茅兵,谢立.基于任务和角色的双重Web访问控制模型[J].计算机研究与发展,2004,41(9):1466-1473. 被引量:18
  • 2金琼琤,杨树堂,蒋兴浩,李建华.基于T-RBAC的企业权限管理方法[J].计算机工程,2004,30(19):93-95. 被引量:8
  • 3任峥慧.基于Linux操作系统的安全编程[J].计算机工程与设计,2005,26(4):1009-1011. 被引量:2
  • 4Chris Wrlght,Crispin Cowan,James Morris et al.Linux Security Module Framework.http://www.kroah.com/linux/talks/ols_2002_lsm_paper/ lsm.pdf.
  • 5Stephen Smalley,Chris Vance,Wayne Salamon.Implementing SELinux as a Linux Security Module[R].NAI Labs Report,2002.
  • 6Stephen SmaUey,Timothy Fraser,Chris Vance.Linux Security Modules:General Security Hooks for Linux.http://lsm.immunix.org/,2001-09.
  • 7Chris Wright,Crispin Cowan,Stephen Smalley et al.Linux Security Modules:General Security Support for the Linux Kemel[C].In:USENIX Security Symposium,San Francisco,CA,2002-08.
  • 8Daniel p Bovet,Macro Cesati.Understanding The Linux Kernel[M].2^nd Edition.O'Reilly & Associate Inc,2002.
  • 9Robert Watson,Wayne Morrison,Chris Vance et al.The TrustedBSD MAC Framework:Extensible Kernel Access Control for FreeBSD 5.0[C]. In :USENIX Annual Technical Conference,San Antonio,TX,2003-06.
  • 10Robert Watson.FreeBSD Handbook: Mandatory Access Control(MAC). http ://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/mac.html.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部