By Topic

Using SESAME to implement role based access control in Unix file systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ashley, P. ; Inf. Security Res. Center, Queensland Univ., Brisbane, Qld., Australia ; Vandenwauver, M.

Computer networks and assets have become a very valuable resource for modern companies. Securing these resources is thus vital for their survival. Enterprises nowadays want to have their organizational structure mirrored into their security policy. Role based access control (RBAC) has proven to be an essential tool in this process. Although Microsoft based systems have acquired a large part of the market, it seems that the old but very reliable Unix is getting a boost as well. Unfortunately, standard Unix does not implement RBAC. In this paper a solution to this problem is described that uses the Novell SESAME security architecture. To this end the paper introduces a new RBAC model

Published in:

Enabling Technologies: Infrastructure for Collaborative Enterprises, 1999. (WET ICE '99) Proceedings. IEEE 8th International Workshops on

Date of Conference: