A Role-Based Model of Linux Privilege Management and its Implementation

被引:0
|
作者
Li, Yanzhao [1 ]
Tu, Bibo [1 ]
Zhu, Min [1 ]
Meng, Dan [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Capabilities; Linux; Access Control; Privilege Separation;
D O I
10.1109/CICN.2015.278
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
At present, With the wide application of Linux system, the security performance of Linux system is meeting more and more challenges. This paper analyzes the the security flaw of traditional Linux security mechanism in which the presence of superuser root violates the principle of least privilege in security system design, which brings various kinds of privilege elevation attacks. The current fine-grained solution Capabilities mechanism proposed by POSIX1e divides root superuser into privilege units, but it fails to remove root user from the Linux system. By analyzing the imperfection of current solutions, this paper proposes a novel role-based privilege management model. By distributing capabilities to roles and assigning roles to specific users, this model not only removes superuser root from the Linux system but also builds an privilege-separation system. With implementation in Linux system and experiments, this model proves to be fine-grained and privilege-seprated with no performance loss.
引用
收藏
页码:1442 / 1445
页数:4
相关论文
共 50 条
  • [21] Study on role-based IT strategy implementation mechanism
    Hao, XL
    Proceedings of the 2005 International Conference on Management Science & Engineering (12th), Vols 1- 3, 2005, : 187 - 191
  • [22] The implementation of role-based access control on the web
    Xu, CG
    Yan, H
    Liu, FG
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
  • [23] Authorization management for role-based collaboration
    Ahn, GJ
    Zhang, LH
    Shin, DW
    Chu, B
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4128 - 4134
  • [24] OntoRT: an Ontology Model for Role-based Trust-management Framework
    Liu, Xinxin
    Tang, Shaohua
    Wei, Kai
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS II, PTS 1-3, 2011, 58-60 : 2085 - 2090
  • [25] An Improved Cross-domain Role-based Authorization Management Model
    Zheng, Jun
    Tan, Yuan
    Zhang, Qikun
    Sun, Xin
    Chen, Yichun
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IV, 2010, : 325 - 331
  • [26] An Improved Cross-Domain Role-Based Authorization Management Model
    Zheng, Jun
    Tan, Yuan
    Zhang, Qikun
    Sun, Xin
    Chen, Yichun
    APPLIED INFORMATICS AND COMMUNICATION, PT 4, 2011, 227 : 526 - 537
  • [27] Enabling role-based delegation and revocation on security-enhanced Linux
    Ahn, Gail-Joon
    Gami, Dhruv
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 700 - 705
  • [28] Role-based Runtime Model Synchronization
    Werner, Christopher
    Schoen, Hendrik
    Kuehn, Thomas
    Goetz, Sebastian
    Assmann, Uwe
    44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 306 - 313
  • [29] Role-Based Generic Model Refactoring
    Heimann, Jan
    Seifert, Mirko
    Assmann, Uwe
    MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PT II, 2010, 6395 : 78 - 92
  • [30] A Role-Based Fuzzy Assignment Model
    ZUO Bao-he
    Journal of Systems Science and Systems Engineering, 2002, (02) : 190 - 196