User's authorization in singularity operating system

被引:0
|
作者
Matarneh, Rami [1 ]
Al Jubori, Suha [1 ]
机构
[1] Al Isra Private Univ, Fac Adm & Financial Sci, PO 11622, Amman, Jordan
关键词
Access Controller; Certificate Authority; Access Control Lists; Singularity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We describe a new design for authorization in operating systems. In this design two additional units are introduced, Certificate Authority which provide certificates for authorization for all participants and Access Controller which is responsible for making access decisions, and we describe the implementation of our design and its performance in the context of Singularity operating system.
引用
收藏
页码:439 / 445
页数:7
相关论文
共 50 条
  • [11] Authorization policies: Using Decision Support System for context-aware protection of user's private data
    Oglaza, Arnaud
    Laborde, Romain
    Zarate, Pascale
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1639 - 1644
  • [12] Analyzing HTTPS Encrypted Traffic to Identify User's Operating System, Browser and Application
    Muehlstein, Jonathan
    Zion, Yehonatan
    Rahumit, Maor
    Kirshenboim, Itay
    Dubint, Ran
    Dvir, Amit
    Pete, Ofir
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017,
  • [13] OPERATING SYSTEM ELEMENTS - A USER PERSPECTIVE - CALINGAERT,P
    PEACHEY, D
    COMPUTER, 1983, 16 (07) : 141 - 141
  • [14] OPEN OPERATING SYSTEM FOR A SINGLE-USER MACHINE
    LAMPSON, BW
    REVUE FRANCAISE D AUTOMATIQUE INFORMATIQUE RECHERCHE OPERATIONNELLE, 1975, 9 (NB3): : 5 - 18
  • [15] OPERATING SYSTEM ELEMENTS - A USER PERSPECTIVE - CALINGAERT,P
    GILES, P
    COMPUTER JOURNAL, 1983, 26 (04): : 383 - 383
  • [16] Zanzibar: Google's Consistent, Global Authorization System
    Pang, Ruoming
    Caceres, Ramon
    Burrows, Mike
    Chen, Zhifeng
    Dave, Pratik
    Germer, Nathan
    Golynski, Alexander
    Graney, Kevin
    Kang, Nina
    Kissner, Lea
    Korn, Jeffrey L.
    Parmar, Abhishek
    Richards, Christopher D.
    Wang, Mengzhi
    PROCEEDINGS OF THE 2019 USENIX ANNUAL TECHNICAL CONFERENCE, 2019, : 33 - 46
  • [18] User Authentication and Authorization Framework in IoT Protocols
    Mohammad, Ammar
    Al-Refai, Hasan
    Alawneh, Ali Ahmad
    COMPUTERS, 2022, 11 (10)
  • [19] User Profiling in Anomaly Detection of Authorization Logs
    Zamanian, Zahedeh
    Feizollah, Ali
    Anuar, Nor Badrul
    Kiah, Laiha Binti Mat
    Srikanth, Karanam
    Kumar, Sudhindra
    COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 59 - 65
  • [20] Authentication and Authorization of End User in Microservice Architecture
    He, Xiuyu
    Yang, Xudong
    2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910