Access Rights Analysis in Microsoft Windows and Linux Operating Systems
Author(s): BACIVAROV, Ioan; MIHAI, Ioan-Cosmin
Author(s) keywords: access control, access rights, security logical level
Reference keywords: information security, sistem security
Abstract:
Security logical level of a system consists of software methods that provide resources and services access control system. It is divided in two categories: security level access and security services. This paper analyzes the security level access of two operating systems: Microsoft Windows and Linux. It is presented the way to define users and groups and how to establish access rights to information, applications or services depending on the operating system installed on the system.
References:
[1]. D. Acostachioaie, Securitatea sistemelor Linux, Editura Polirom, ISBN: 973-681-317-7, 2003.
[2]. J. Beale, Detecting server compromises, Information Security Magazine, TechTarget, Feb. 2003.
[3]. D.G. Firesmith, Engineering Security Requirements, Journal of Object Technology, vol. 1, Jan-Feb. 2003, pp. 53-68.
[4]. D.G. Firesmith, Security Use Cases, Journal of Object Technology, vol. 3, May-Jun. 2003, pp. 53-64.
[5]. R.J. Hontanon, Securitatea în Linux, Editura Teora.
[6]. L. Klander, E.J. Renehan Jr., Hacker Proof: The Ultimate Guide to Network Security, Delmar Publishers, 2006.
[7]. I.C. Mihai, I.F. Popa, B.G. Tătaru, Securitatea în Internet, Ed. Sitech, 2008.
[8]. I.C. Mihai, „Analiza securităţii informaţiilor”, Studii de securitate publică, vol. 2, 2012, pp. 24-34.
[9]. D. Oprea, Protecția și securitatea informațiilor. Ed. II, Editura Polirom, ISBN: 978-973-46-0927-7, 2007.
[10]. S. Popa, Securitatea sistemelor informatice - note de curs și aplicații, Editura Alma Mater Bacău, ISBN: 978-973-1833-21-7, 2007.
[11]. T. Tidwell, R. Larson, K. Fitch and J. Hale, Modeling Internet Attacks, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 Jun. 2001.
[12]. X. Zhao, K. Borders, and A. Prakash, Towards Protecting Sensitive Files in a Compromised System, 3rd International IEEE Security in Storage Workshop, 2005.
English title: Access Rights Analysis in Microsoft Windows and Linux Operating Systems
Original title: Analiza drepturilor de acces în sistemele de operare Microsoft Windows și Linux
Author(s): BACIVAROV, Ioan; MIHAI, Ioan-Cosmin
Article Language: Romanian
Date of Publication: 2012-06-21
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2012.01.01
Issue: Volume 1, Issue 1, Year 2012
Section: Advances in Information Security Research
Page Range: 8-14 (7 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.