{"title":"可信DG/UX上的RBAC仿真","authors":"W. Meyers","doi":"10.1145/266741.266754","DOIUrl":null,"url":null,"abstract":"One goal of Role-Based Access Control (RBAC) research is to identify generally applicable mechanisms that are sufficiently flexible to support RBAC behavior in diverse applications. This paper discusses three candidate mechanisms that are available in DG/UX@ B2 Security Option, a high security commercial off-the-shelfoperating system. Quite a bit of RBAC semantics can be achieved by simply setting the system’s site-configurable policy parameters. Additional RBAC features, such as dynamic role management, can be realized with modest amounts of site-written software. To improve manageability, an RRAC presentation layer can also be added to the site-extensible administration interface. The effort required to retain the high security assurances of the underlying operating system, using these mechanisms, ranges from none to reasonable.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"RBAC emulation on trusted DG/UX\",\"authors\":\"W. Meyers\",\"doi\":\"10.1145/266741.266754\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One goal of Role-Based Access Control (RBAC) research is to identify generally applicable mechanisms that are sufficiently flexible to support RBAC behavior in diverse applications. This paper discusses three candidate mechanisms that are available in DG/UX@ B2 Security Option, a high security commercial off-the-shelfoperating system. Quite a bit of RBAC semantics can be achieved by simply setting the system’s site-configurable policy parameters. Additional RBAC features, such as dynamic role management, can be realized with modest amounts of site-written software. To improve manageability, an RRAC presentation layer can also be added to the site-extensible administration interface. The effort required to retain the high security assurances of the underlying operating system, using these mechanisms, ranges from none to reasonable.\",\"PeriodicalId\":355233,\"journal\":{\"name\":\"ACM Workshop on Role-Based Access Control\",\"volume\":\"133 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Workshop on Role-Based Access Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/266741.266754\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Workshop on Role-Based Access Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/266741.266754","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
One goal of Role-Based Access Control (RBAC) research is to identify generally applicable mechanisms that are sufficiently flexible to support RBAC behavior in diverse applications. This paper discusses three candidate mechanisms that are available in DG/UX@ B2 Security Option, a high security commercial off-the-shelfoperating system. Quite a bit of RBAC semantics can be achieved by simply setting the system’s site-configurable policy parameters. Additional RBAC features, such as dynamic role management, can be realized with modest amounts of site-written software. To improve manageability, an RRAC presentation layer can also be added to the site-extensible administration interface. The effort required to retain the high security assurances of the underlying operating system, using these mechanisms, ranges from none to reasonable.