Artigo Revisado por pares

Building Chinese walls in standard unixTM

1997; Elsevier BV; Volume: 16; Issue: 6 Linguagem: Inglês

10.1016/s0167-4048(97)00010-2

ISSN

1872-6208

Autores

Simon N. Foley,

Tópico(s)

Advanced Malware Detection Techniques

Resumo

The set-user-id facility in Unix can be used to form the basis for the implementation of a wide variety of different security policies in Unix. We show how the Chinese Wall security policy can be implemented using this facility. The approach is not appropriate for security critical applications: it serves to illustrate that it can be done in a rather simple way, and may be useful for less critical applications. Our technique also provides an approach to implementing dynamic segregation of duties in Unix.

Referência(s)
Altmetric
PlumX