The typical way to run an administrative task on Linux is to execute it in the context of a super user. This breaks the principle of least privilege on access control. Other solutions, such as SELinux and AppArmor, are available but complex to use. In this paper, a new Linux module, named RootAsRole, is proposed to allow users to fine-grained control the privileges they grant to Linux commands as capabilities. It adopts a role-based access control (RBAC) [14], in which administrators can define a set of roles and the capabilities that are assigned to them. Administrators can then define the rules controlling what roles users or groups can assign to themselves. Each time a Linux user wants to execute a program that necessitates one or more c...
Copyright © 2018 Inderscience Enterprises Ltd. Mobile ad hoc networks (MANETs) are infrastructureles...
© 2017 IEEE. We describe how FIDO and W3C VCs can overcome the problems of existing identity managem...
© 2017 Elsevier B.V. There is an ongoing debate about the role of Web 2.0 applications (e.g., Facebo...
Today, Linux users use sudo/su commands to attribute Linux’s administrative privileges to their prog...
Part 4: Application and System SecurityInternational audienceThe typical way to run an administrativ...
Historically and by default, Linux does not respect the principle of least privilege because it gran...
© 2018 IEEE. This research presents a penetration testing approach to help secure OpenSSH service on...
This paper presents a policy-based approach for securing the contexts associated with Web services, ...
Inside cyber security threats by system administrators are some of the main concerns of organization...
© 2016 IEEE. Humans communication and interaction have dramatically changed in the last century with...
© 2017 ACM. This study exposes a serious and rapidly growing cyber threat of compromised legitimate ...
In this chapter, we present the AOM profile proposed for the specification of security aspects on UM...
Recent advances in hardware, software, computing, and communication technologies have enabled the de...
The last few years have seen a rapid democratization of things to the extent that they have become o...
© 2018 IEEE. Despite the smooth weaving of the Internet-of-Things into people\u27s daily lives, many...
Copyright © 2018 Inderscience Enterprises Ltd. Mobile ad hoc networks (MANETs) are infrastructureles...
© 2017 IEEE. We describe how FIDO and W3C VCs can overcome the problems of existing identity managem...
© 2017 Elsevier B.V. There is an ongoing debate about the role of Web 2.0 applications (e.g., Facebo...
Today, Linux users use sudo/su commands to attribute Linux’s administrative privileges to their prog...
Part 4: Application and System SecurityInternational audienceThe typical way to run an administrativ...
Historically and by default, Linux does not respect the principle of least privilege because it gran...
© 2018 IEEE. This research presents a penetration testing approach to help secure OpenSSH service on...
This paper presents a policy-based approach for securing the contexts associated with Web services, ...
Inside cyber security threats by system administrators are some of the main concerns of organization...
© 2016 IEEE. Humans communication and interaction have dramatically changed in the last century with...
© 2017 ACM. This study exposes a serious and rapidly growing cyber threat of compromised legitimate ...
In this chapter, we present the AOM profile proposed for the specification of security aspects on UM...
Recent advances in hardware, software, computing, and communication technologies have enabled the de...
The last few years have seen a rapid democratization of things to the extent that they have become o...
© 2018 IEEE. Despite the smooth weaving of the Internet-of-Things into people\u27s daily lives, many...
Copyright © 2018 Inderscience Enterprises Ltd. Mobile ad hoc networks (MANETs) are infrastructureles...
© 2017 IEEE. We describe how FIDO and W3C VCs can overcome the problems of existing identity managem...
© 2017 Elsevier B.V. There is an ongoing debate about the role of Web 2.0 applications (e.g., Facebo...