issues
search
libra10042
/
OS
0
stars
0
forks
source link
[Chapter17] Protection
#17
Open
libra10042
opened
1 year ago
libra10042
commented
1 year ago
Goals of Protection
Principles of Protection
Protection Rings
Domain of Protection
Domain Structure
UNIX
Example : Android Application IDs
Access Matrix
Implementation of Access Matrix
Global Table
Access Lists for Objects
Capability Lists for Domains
A Lock-key Mechanism
Comparison
Revocation of Access Rights
Role-Based Access Control
Mandatory Access Control, MAC
Capability-Based Systems
Linux Capabilites
Darwin Entitlements
Other Protection Improvement Methods
System Integrity Protection
System-call Filtering
Sandboxing
Code singnature
Language-Based Protection
Compiler-Based Enforcement
Run-Time-Based Enforcement-Protection in Java
Goals of Protection
Principles of Protection
Protection Rings
Domain of Protection
Access Matrix
Implementation of Access Matrix
Revocation of Access Rights
Role-Based Access Control
Mandatory Access Control, MAC
Capability-Based Systems
Other Protection Improvement Methods
Language-Based Protection