Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.1.011

Multiple User Authentication based on SecuROS/FreeBSD  

Doo, So-Young (한국전자통신연구원 보안운영체제연구팀)
Kim, Jong-Nyeo (한국전자통신연구원 보안운영체제연구팀)
Kong, Eun-Bae (충남대학교 컴퓨터공학과)
Abstract
This paper implements Multiple User Authentication System to which the system authenticating with password only has been upgraded. The 4-staged authentication including user ID, password, smart card and access control information, etc. is used at the suggested Multiple User Authentication System. The user authentication system that this paper suggests has been developed based on SecuROS/FreeBSD with the function of access control added to FreeBSD kernel. It provides both the function to limit accost range to the system to each user and the function to check that when inputting important information the demand is the one if the system ; thus, the reliability becomes increased. In the SecuROS/FreeBSD system, MAC and RBAC are being used. So, in the case of users accessing to the system, the Information about the policies of MAC and RBAC to which users would access is used in the authentication. At the time, the access to system if permitted only when the access control information that users demanded satisfies all the access control rules which have been defined In the system.
Keywords
Trusted Path; User Authentication; Mandatory Access Control; Role Based Access Control;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://www.radium.ncsc.mil/tpep/library/tcsec/index.html
2 Jong Gook Ko, Jeong Nyeo Kim, and Kyo Il Jeong, 'Access Control for Secure FreeBSD Operating System,' WISA2001, Vol. 2, 2001
3 IEEE Std 1003.1e-Draft standard for information Technology-portable Operating System Interface(POSIX)Part 1:System Application Program Interface(API)-Protection, Audit and Control Interfaces
4 IEEE Std 1003.2c-Draft standard for information Technology-Portable Operating System Interface(POSIX)Part 2 : Shell and Utilities: Protection and Control Interfaces
5 Rule Set Based Access Control, http://www.rsbac.de
6 Roos Lindgreen, Herschberg I.S., 'On the Validity of the Bell-Lapadula model,' Computer & Security, Vol.13, pp. 317-338, 1994   DOI   ScienceOn
7 David A. Wheeler, 'Secure Programming for LINUX and UNIX HOWTO,' http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/book1.html
8 Santosh Chokhani, 'Trusted Products Evaluation,' Communications of the ACM, Vol.35, No. 7, July, 1992   DOI
9 Raymon M. Wong, 'A Comparision of Secure UNIX Operating System,' IEEE, 1990   DOI
10 Simon Wiseman, Phill Terry, Andrew Wood, 'The Trusted Path between SMITE and the User,' British Crown Copyright, 1988   DOI
11 Jeremy Epstein, John Mchugh, Rita Pascale, 'A Prototype B3 Trusted X Window System,' IEEE, 1991   DOI