DocumentCode :
2158773
Title :
Using RBAC to Enforce Solaris System Security
Author :
Ni, Qinqin ; Sun, Weizhen ; Liang, Xu
Author_Institution :
Dept. of Comput. Sci. & Technol., Capital Normal Univ., Beijing, China
fYear :
2009
fDate :
20-22 Sept. 2009
Firstpage :
1
Lastpage :
4
Abstract :
Security of operating system is the most important part of a system. Role-based access control (RBAC) is a security feature, also is the hotspot of access control filed. This paper mainly introduces the feature of Solaris RBAC model, the relationship of RBAC elements in Solaris, analyzes the cooperating work of roles, privileges and authorizations in Solaris RBAC. By testing planning and configuring RBAC in Solaris, the experiments prove that RBAC and privileges provide a more secure alternative to superuser, can enforce the Solaris system security effectively.
Keywords :
authorisation; operating systems (computers); RBAC configuration; Solaris operating system security; authorization; planning testing; role-based access control; Access control; Authorization; Computer science; Computer security; NIST; National security; Operating systems; Permission; Power system security; Sun;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Management and Service Science, 2009. MASS '09. International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-4638-4
Electronic_ISBN :
978-1-4244-4639-1
Type :
conf
DOI :
10.1109/ICMSS.2009.5304223
Filename :
5304223
Link To Document :
بازگشت