Towards analyzing complex operating system access control configurations.
Hong ChenNinghui LiChristopher S. GatesZiqing MaoPublished in: SACMAT (2010)
Keyphrases
- operating system
- access control
- discretionary access control
- mandatory access control
- security mechanisms
- high assurance
- computer systems
- fine grained
- role based access control
- data security
- dynamic access control
- access control policies
- security requirements
- security policies
- virtual machine
- distributed systems
- microsoft windows
- protection schemes
- security model
- database