• DocumentCode
    2158773
  • Title

    Using RBAC to Enforce Solaris System Security

  • Author

    Ni, Qinqin ; Sun, Weizhen ; Liang, Xu

  • Author_Institution
    Dept. of Comput. Sci. & Technol., Capital Normal Univ., Beijing, China
  • fYear
    2009
  • fDate
    20-22 Sept. 2009
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Security of operating system is the most important part of a system. Role-based access control (RBAC) is a security feature, also is the hotspot of access control filed. This paper mainly introduces the feature of Solaris RBAC model, the relationship of RBAC elements in Solaris, analyzes the cooperating work of roles, privileges and authorizations in Solaris RBAC. By testing planning and configuring RBAC in Solaris, the experiments prove that RBAC and privileges provide a more secure alternative to superuser, can enforce the Solaris system security effectively.
  • Keywords
    authorisation; operating systems (computers); RBAC configuration; Solaris operating system security; authorization; planning testing; role-based access control; Access control; Authorization; Computer science; Computer security; NIST; National security; Operating systems; Permission; Power system security; Sun;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Management and Service Science, 2009. MASS '09. International Conference on
  • Conference_Location
    Wuhan
  • Print_ISBN
    978-1-4244-4638-4
  • Electronic_ISBN
    978-1-4244-4639-1
  • Type

    conf

  • DOI
    10.1109/ICMSS.2009.5304223
  • Filename
    5304223