Building Chinese walls in standard unixTM
โ Scribed by Simon N. Foley
- Book ID
- 104297883
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 1002 KB
- Volume
- 16
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
The set-user-id facility in Unix can be used to form the basis for the implementation of a wide variety of different security policies in Unix. We show how the Chinese Wall security policy can be implemented using this facility. The approach is not appropriate for security critical applications: it serves to illustrate that it can be done in a rather simple way, and may be useful for less critical applications.
Our technique also provides an approach to implementing dynamic segregation of duties in Unix.
๐ SIMILAR VOLUMES
When buildings are subjected to earthquakes, it is imperative to dissipate some of the input energy through predetermined and well designed mechanisms. This study investigates the influence of mechanical control on structural systems through the application of strategically located component element