User's authorization in singularity operating system

被引:0
|
作者
Matarneh, Rami [1 ]
Al Jubori, Suha [1 ]
机构
[1] Al Isra Private Univ, Fac Adm & Financial Sci, PO 11622, Amman, Jordan
关键词
Access Controller; Certificate Authority; Access Control Lists; Singularity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We describe a new design for authorization in operating systems. In this design two additional units are introduced, Certificate Authority which provide certificates for authorization for all participants and Access Controller which is responsible for making access decisions, and we describe the implementation of our design and its performance in the context of Singularity operating system.
引用
收藏
页码:439 / 445
页数:7
相关论文
共 50 条
  • [31] A privacy enabled service authorization based on a user-centric virtual identity management system
    Chen, Zhikui
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 583 - 587
  • [32] Enhanced Framework for Verifying User Authorization and Data Correctness Using Token Management System in the Cloud
    Balamurugan, B.
    Krishna, P. Venkata
    Devi, Nirmala M.
    Meenakshi, R.
    Abinaya, V
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1443 - 1447
  • [33] Authentication and authorization user management within a collaborative community
    Encheva, Sylvia
    Tumin, Sharil
    PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 563 - +
  • [34] SSAT: Active Authorization Control and User's Fingerprint Tracking Framework for DNN IP Protection
    Xue, Mingfu
    Wu, Yinghao
    Zhang, Leo yu
    Gu, Dujuan
    Zhang, Yushu
    Liu, Weiqiang
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (10)
  • [35] A study on secure user authentication and authorization in OAuth protocol
    Chae, Cheol-Joo
    Kim, Ki-Bong
    Cho, Han-Jin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1991 - 1999
  • [36] Usage and Impact of Model-Based User Authorization
    Juhrisch, Martin
    Dietz, Gunnar
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2012, 25 (03) : 98 - 116
  • [37] Optimized intelligent strategy for user authorization by facial recognition
    Pamarthi, Pranathi
    Lakshmi, C.
    Suneetha, M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (23) : 63353 - 63378
  • [38] AQUA: An Efficient Solver for the User Authorization Query Problem
    Armando, Alessandro
    Gazzarata, Giorgia A.
    Turkmen, Fatih
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 153 - 154
  • [39] Safety and Availability Checking for User Authorization Queries in RBAC
    Jian-feng Lu
    Jian-min Han
    Wei Chen
    Jin-Wei Hu
    International Journal of Computational Intelligence Systems, 2012, 5 : 860 - 867
  • [40] Safety and Availability Checking for User Authorization Queries in RBAC
    Lu, Jian-feng
    Han, Jian-min
    Chen, Wei
    Hu, Jin-Wei
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (05) : 860 - 867