A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Trojan horse resistant discretionary access control
2009
Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandatory Access Control (MAC) systems, but are vulnerable to attacks that use trojan horse or exploit buggy software. We show that it is possible to have the best of both worlds: DAC's easy-to-use discretionary policy specification and MAC's defense against trojan horses and buggy programs. This is made possible by a key new
doi:10.1145/1542207.1542244
dblp:conf/sacmat/MaoLCJ09
fatcat:ak3xj64u45ftpbn7ici6swqa4m