An authorization mechanism for unix-based cooperative environments
References (30)
The Design of the Unix Operating System
(1986)The SETUID feature in UNIX and security
- et al.
PWB/UNIX—overview and synopsis of facilities
Technical Report Bell Labs
(1977) Cryptography and Data Security
(1982)Software Engineering
(1989)- et al.
A comparison of commercial and military computer security policies
Granting and revoking discretionary authority
Information Systems
(1983)A generalized information flow model of the role of system security officers
- et al.
Data sharing in group work
ACM Trans. Office Inform. Syst.
(1988)
KSOS—the design of a secure operating system
UCLA Secure UNIX
Department of Defense, National Computer Security Center, Repor DoD 5200. 28-STD
(1985)
On the design and the implementation of secure XENIX workstations
Standardization in operating systems
Cited by (0)
Copyright © 1991 Published by Elsevier Ltd.