Policy-adaptive capability inheritance algorithm consistent with POSIX standard

In order to support POSIX capability mechanism,many secure operating systems provided individual capability inheritable algorithms.These algorithms were only applicable to specified least privilege control policies,and had such defects as semantic conflicts and no defined security-objectives.So they...

Full description

Saved in:
Bibliographic Details
Main Authors: SHEN Qing-ni1, QING Si-han1, HE Ye-ping1, SHEN Jian-jun1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2006-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74667010/
Tags: Add Tag
No Tags, Be the first to tag this record!