Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2006, Vol. 32 ›› Issue (21): 162-163,.

• Security Technology • Previous Articles     Next Articles

A User-based Security Model of POSIX Capabilities and Its Realization

XU Ping1, LU Songnian2, YANG Shutang2   

  1. (1. .School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240; 2. Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030)
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-11-05 Published:2006-11-05

一种基于用户的Capabilities安全模型及其实现

许 平1,陆松年2,杨树堂2   

  1. (1. 上海交通大学信息安全工程学院,上海 200240;2. 上海交通大学电子工程系,上海 200030)

Abstract: This paper analyzes the disadvantage of POSIX capabilities on Linux, which also puts forward a user-based model of POSIX capabilities and its realization on Linux. And the enhancement of Linux security with the new model is analyzed as well.


Key words: Capabilities, Linux, Access control

摘要:

分析了Linux下Capabilities安全模型的不完善性,并提出了一种基于用户的Capabilities安全模型,给出了在Linux下的实现方式。同时,还分析了如何利用改进后的安全模型来增强Linux的安全性。

关键词: Capabilities, Linux, 访问控制

CLC Number: