Changed "section" to "chapter"
This commit is contained in:
parent
fae2a67fc9
commit
b4a5ca2067
@ -28,7 +28,7 @@ The fundamental weakness of the traditional UNIX DAC model, and even its extensi
|
||||
|
||||
This vulnerability stems from the “all or nothing” nature of user ownership. A process running with user’s EUID inherits all of user’s privileges, treating all files they own as equally accessible. There’s no way to restrict a specific process, even one initiated by the user themselves, from accessing certain files or performing certain operations.
|
||||
|
||||
These limitations highlight the need for more sophisticated access control mechanisms that go beyond simple user identity and consider the context and trustworthiness of the process attempting to access a resource. Mandatory Access Control (MAC) and sandboxing technologies are emerging solutions aiming to address these shortcomings by introducing finer-grained control over process privileges and resource access. The following sections will explore these alternatives in detail.
|
||||
These limitations highlight the need for more sophisticated access control mechanisms that go beyond simple user identity and consider the context and trustworthiness of the process attempting to access a resource. Mandatory Access Control (MAC) and sandboxing technologies are emerging solutions aiming to address these shortcomings by introducing finer-grained control over process privileges and resource access. The following chapter will explore these alternatives in detail.
|
||||
|
||||
\todo[inline, author={\textbf{Draft note}}]{Talk more about the threat model?}
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user