RBAC emulation on trusted DG/UX
- 1 January 1997
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
One goal of Role-Based Access Control (RBAC) research is to identify generally applicable mechanisms that are sufficiently flexible to support RBAC behavior in diverse applications. This paper discusses three candidate mechanisms that are available in DG/UX@ B2 Security Option, a high security commercial off-the-shelfoperating system. Quite a bit of RBAC semantics can be achieved by simply setting the system’s site-configurable policy parameters. Additional RBAC features, such as dynamic role management, can be realized with modest amounts of site-written software. To improve manageability, an RRAC presentation layer can also be added to the site-extensible administration interface. The effort required to retain the high security assurances of the underlying operating system, using these mechanisms, ranges from none to reasonable. Summary The system to be described here is DGAJX B2 Security Option, a high-security version of Data General’s DCVUX operating system. The DG/UX system has been commercially available since 1985 [Kelly 19891, and high-security versions have been marketed since 1992 [Gutnick 1997, Kemmerer 19961. The current release of DG/UX B2 Security Option (R4.12 MU0 1) offers the following three mechanisms that appear useful for emulating RRAC behavior [Sandhu 19961:Keywords
This publication has 0 references indexed in Scilit: