Hierarchical Role Graph Model for UNIX Access Control

Free registration required

Executive Summary

The access control system is a very important step in the implementation of the security policy of an information system. Access control checks what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way the access control seeks to prevent the activities which will be able to endanger the safety of the system. The aim of this paper is to try to model the access control system in the Operating Systems of the type UNIX. The modeling will be based on a combining of the UNIX access control system, namely Super-User model, and RBAC model.

  • Format: PDF
  • Size: 344.75 KB