DocumentCode
2158773
Title
Using RBAC to Enforce Solaris System Security
Author
Ni, Qinqin ; Sun, Weizhen ; Liang, Xu
Author_Institution
Dept. of Comput. Sci. & Technol., Capital Normal Univ., Beijing, China
fYear
2009
fDate
20-22 Sept. 2009
Firstpage
1
Lastpage
4
Abstract
Security of operating system is the most important part of a system. Role-based access control (RBAC) is a security feature, also is the hotspot of access control filed. This paper mainly introduces the feature of Solaris RBAC model, the relationship of RBAC elements in Solaris, analyzes the cooperating work of roles, privileges and authorizations in Solaris RBAC. By testing planning and configuring RBAC in Solaris, the experiments prove that RBAC and privileges provide a more secure alternative to superuser, can enforce the Solaris system security effectively.
Keywords
authorisation; operating systems (computers); RBAC configuration; Solaris operating system security; authorization; planning testing; role-based access control; Access control; Authorization; Computer science; Computer security; NIST; National security; Operating systems; Permission; Power system security; Sun;
fLanguage
English
Publisher
ieee
Conference_Titel
Management and Service Science, 2009. MASS '09. International Conference on
Conference_Location
Wuhan
Print_ISBN
978-1-4244-4638-4
Electronic_ISBN
978-1-4244-4639-1
Type
conf
DOI
10.1109/ICMSS.2009.5304223
Filename
5304223
Link To Document