Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Analysis of access control policies ...
~
Chen, Hong.
Linked to FindBook
Google Book
Amazon
博客來
Analysis of access control policies in operating systems.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Analysis of access control policies in operating systems./
Author:
Chen, Hong.
Description:
95 p.
Notes:
Source: Dissertation Abstracts International, Volume: 71-05, Section: B, page: 3136.
Contained By:
Dissertation Abstracts International71-05B.
Subject:
Computer science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3402307
ISBN:
9781109743821
Analysis of access control policies in operating systems.
Chen, Hong.
Analysis of access control policies in operating systems.
- 95 p.
Source: Dissertation Abstracts International, Volume: 71-05, Section: B, page: 3136.
Thesis (Ph.D.)--Purdue University, 2009.
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the security consequences are serious. It is critical to have models and tools to analyze thoroughly the effectiveness of access control policies in operating systems and to eliminate configuration errors.
ISBN: 9781109743821Subjects--Topical Terms:
523869
Computer science.
Analysis of access control policies in operating systems.
LDR
:02372nmm a2200313 4500
001
2060477
005
20150828095240.5
008
170521s2009 ||||||||||||||||| ||eng d
020
$a
9781109743821
035
$a
(MiAaPQ)AAI3402307
035
$a
AAI3402307
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Chen, Hong.
$3
757561
245
1 0
$a
Analysis of access control policies in operating systems.
300
$a
95 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-05, Section: B, page: 3136.
500
$a
Adviser: Ninghui Li.
502
$a
Thesis (Ph.D.)--Purdue University, 2009.
520
$a
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the security consequences are serious. It is critical to have models and tools to analyze thoroughly the effectiveness of access control policies in operating systems and to eliminate configuration errors.
520
$a
In this dissertation, we propose an approach to systematically analyze access control policies in operating systems. The effectiveness of a policy can be evaluated under attack scenarios. An attack scenario consists of the initial resources an attacker has and the attacker's objective. Attacks under an attack scenario are encoded in a host attack graph. Compared to existing solutions, our approach is more comprehensive and does not rely on manually defined attack patterns.
520
$a
Based on the model, a tool called VulSAN is implemented to analyze policies in Linux systems, and a tool calledWACCA is implemented to analyze policies inWindows systems. We analyze policies in Ubuntu, Fedora, SUSE Linux and Windows Vista. We discuss the results and show the possibilities to improve the quality of protection. The results are also used to compare the effectiveness of SELinux and AppArmor policies in a version of Ubuntu Linux.
590
$a
School code: 0183.
650
4
$a
Computer science.
$3
523869
650
4
$a
Computer engineering.
$3
621879
650
4
$a
Information technology.
$3
532993
690
$a
0984
690
$a
0464
690
$a
0489
710
2
$a
Purdue University.
$b
Computer Sciences.
$3
1019069
773
0
$t
Dissertation Abstracts International
$g
71-05B.
790
$a
0183
791
$a
Ph.D.
792
$a
2009
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3402307
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9293135
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login