首页    期刊浏览 2024年11月07日 星期四
登录注册

文章基本信息

  • 标题:Hierarchical Role Graph Model For Unix Access Control Copyright -->
  • 本地全文:下载
  • 作者:Abderrahim Ghadi1 ; Driss Mammass ; Maurice Mignotte
  • 期刊名称:International Journal of Future Generation Communication and Networking
  • 印刷版ISSN:2233-7857
  • 出版年度:2009
  • 卷号:2
  • 期号:2
  • 出版社:SERSC
  • 摘要:The access control system is a very important step in the implementation of the security policy of an information system. Access control checks what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way the access control seeks to prevent the activities which will be able to endanger the safety of the system. The aim of this paper is to try to model the access control system in the operating systems of the type UNIX. The modeling will be based on a combining of the UNIX access control system, namely Super-User model, and RBAC1 model [1, 11, 12]. In order to get a model nearest possible at reality, we will use the notion of roles and the privileges graph to build our graph. The properties of graph theory well are used in order to evaluate the stability and the robustness of our model.
  • 关键词:Privilege; Role; Graph; Hierarchy; Access Control; SuperUser; DAC; MAC; RBAC.
国家哲学社会科学文献中心版权所有