earticle

논문검색

Hierarchical Role Graph Model for UNIX Access Control

초록

영어

The access control system is a very important step in the implementation of the security policy of an information system. Access control checks what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way the access control seeks to prevent the activities which will be able to endanger the safety of the system. The aim of this paper is to try to model the access control system in the operating systems of the type UNIX. The modeling will be based on a combining of the UNIX access control system, namely Super-User model, and RBAC1 model [1, 11, 12]. In order to get a model nearest possible at reality, we will use the notion of roles and the privileges graph to build our graph. The properties of graph theory well are used in order to evaluate the stability and the robustness of our model.

목차

Abstract
 1. Introduction
 2. SuperUser model: UNIX Access Control
 3. Role Based Access Control: RBAC Model
 4. Privileges graph
 5. Role graph model
  5.1. Build of graph
  5.2. Graph properties
 6. Conclusion
 References

저자정보

  • Abderrahim Ghadi Irf-Sic–Fsa, Ibn Zohr University, Morocco, Irma, University of Strasbourg, France
  • Driss Mammass Irf-Sic–Fsa, Ibn Zohr University, Morocco
  • Maurice Mignotte Irma, University of Strasbourg, France
  • Alain Sartout Irma, University of Strasbourg, France

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.