Support for discretionary role based access control in ACL-oriented operating systems

7Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

The implementation of discretionary role-based access control mechanisms in standard operating systems like Unix suffers from the inability of the system to allow a user to restrict his processes' control over his own objects. By exploiting the user's access rights trojan horses, possibly hidden in downloaded executable content, can undermine the access control policy to perform their malicious tasks. This paper presents an approach to restrict the rights of processes by switching between hierarchically organized user defined subdomains with simple system calls. These domains can be used to implement certain discretionary role based access control policies.

Cite

CITATION STYLE

APA

Friberg, C., & Held, A. (1997). Support for discretionary role based access control in ACL-oriented operating systems. In Proceedings of the ACM Workshop on Role-Based Access Control (pp. 83–94). ACM. https://doi.org/10.1145/266741.266763

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free