{"id":"https://openalex.org/W2160717548","doi":"https://doi.org/10.1145/1866307.1866333","title":"A control point for reducing root abuse of file-system privileges","display_name":"A control point for reducing root abuse of file-system privileges","publication_year":2010,"publication_date":"2010-10-04","ids":{"openalex":"https://openalex.org/W2160717548","doi":"https://doi.org/10.1145/1866307.1866333","mag":"2160717548"},"language":"en","primary_location":{"id":"doi:10.1145/1866307.1866333","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866333","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038853903","display_name":"Glenn Wurster","orcid":null},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Glenn Wurster","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Paul C. van Oorschot","raw_affiliation_strings":["Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038853903"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":1.858,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.88312024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"224","last_page":"236"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7757735848426819},{"id":"https://openalex.org/keywords/file-system","display_name":"File system","score":0.6959266662597656},{"id":"https://openalex.org/keywords/installation","display_name":"Installation","score":0.677740216255188},{"id":"https://openalex.org/keywords/root","display_name":"Root (linguistics)","score":0.5838282108306885},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5604323744773865},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.522710919380188},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5020346641540527},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.49662286043167114},{"id":"https://openalex.org/keywords/root-cause","display_name":"Root cause","score":0.4793032705783844},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44763267040252686},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4321087896823883},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.427179217338562},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3780915141105652},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3378722667694092},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0929689109325409}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7757735848426819},{"id":"https://openalex.org/C2780940931","wikidata":"https://www.wikidata.org/wiki/Q174989","display_name":"File system","level":2,"score":0.6959266662597656},{"id":"https://openalex.org/C146778888","wikidata":"https://www.wikidata.org/wiki/Q836862","display_name":"Installation","level":2,"score":0.677740216255188},{"id":"https://openalex.org/C171078966","wikidata":"https://www.wikidata.org/wiki/Q111029","display_name":"Root (linguistics)","level":2,"score":0.5838282108306885},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5604323744773865},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.522710919380188},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5020346641540527},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.49662286043167114},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.4793032705783844},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44763267040252686},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4321087896823883},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.427179217338562},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3780915141105652},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3378722667694092},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0929689109325409},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1866307.1866333","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1866307.1866333","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM conference on Computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.170.1075","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.170.1075","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.scs.carleton.ca/%7Epaulv/papers/ccs2010-configd.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7900000214576721}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320994","display_name":"Canada Research Chairs","ror":"https://ror.org/0517h6h17"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W64278683","https://openalex.org/W94181602","https://openalex.org/W134434224","https://openalex.org/W161166442","https://openalex.org/W169438588","https://openalex.org/W204189973","https://openalex.org/W1513022537","https://openalex.org/W1516432943","https://openalex.org/W1557270401","https://openalex.org/W1576501285","https://openalex.org/W1607600427","https://openalex.org/W1612561802","https://openalex.org/W1641762327","https://openalex.org/W1651879963","https://openalex.org/W1660562555","https://openalex.org/W1676940139","https://openalex.org/W1683061488","https://openalex.org/W1701709396","https://openalex.org/W1725257720","https://openalex.org/W1742385376","https://openalex.org/W2040234252","https://openalex.org/W2060031515","https://openalex.org/W2089562790","https://openalex.org/W2104507782","https://openalex.org/W2110320325","https://openalex.org/W2110756602","https://openalex.org/W2114525843","https://openalex.org/W2122742966","https://openalex.org/W2125883665","https://openalex.org/W2126220112","https://openalex.org/W2126954297","https://openalex.org/W2127766933","https://openalex.org/W2131726714","https://openalex.org/W2140908857","https://openalex.org/W2143251458","https://openalex.org/W2148542607","https://openalex.org/W2150858564","https://openalex.org/W2152507484","https://openalex.org/W2154081981","https://openalex.org/W2154933195","https://openalex.org/W2159164536","https://openalex.org/W2163809172","https://openalex.org/W2168760272","https://openalex.org/W2535134046","https://openalex.org/W2610551522","https://openalex.org/W2899728002","https://openalex.org/W2921377318","https://openalex.org/W4244704438","https://openalex.org/W4285719527","https://openalex.org/W6637427982","https://openalex.org/W6637449967","https://openalex.org/W6637605221","https://openalex.org/W6683819198","https://openalex.org/W6756096457","https://openalex.org/W6986101027"],"related_works":["https://openalex.org/W2030594396","https://openalex.org/W2535098331","https://openalex.org/W4280640835","https://openalex.org/W2885334669","https://openalex.org/W2202104725","https://openalex.org/W2354546531","https://openalex.org/W2068689476","https://openalex.org/W4242664608","https://openalex.org/W4255366506","https://openalex.org/W2611874565"],"abstract_inverted_index":{"We":[0,74],"address":[1],"the":[2,33,40,44,55,68,76,95,98,132],"problem":[3],"of":[4,54,71,78,97],"restricting":[5],"root's":[6,79],"ability":[7,34,41,81],"to":[8,16,35,42,46,51,63,82,114,135],"change":[9,83],"arbitrary":[10,84],"files":[11,85],"on":[12,19,86],"disk,":[13],"in":[14,61,130],"order":[15,62],"prevent":[17,118],"abuse":[18],"most":[20],"current":[21,80,136],"desktop":[22],"operating":[23],"systems.":[24],"The":[25,49],"approach":[26,99],"first":[27],"involves":[28],"recognizing":[29],"and":[30,88,138],"separating":[31],"out":[32,94],"configure":[36],"a":[37,90,108],"system":[38,45,56],"from":[39,66,121],"use":[43,113],"perform":[47],"tasks.":[48],"permission":[50],"modify":[52],"configuration":[53],"is":[57],"then":[58],"further":[59],"subdivided":[60],"restrict":[64],"applications":[65],"modifying":[67,122],"file-system":[69,103,124],"objects":[70],"other":[72],"applications.":[73],"explore":[75],"division":[77],"disk":[87],"discuss":[89],"prototype":[91],"that":[92,117],"proves":[93],"viability":[96],"for":[100,112,141],"designated":[101],"system-wide":[102],"objects.":[104,125],"Our":[105],"architecture":[106],"exposes":[107],"control":[109],"point":[110],"available":[111],"enforce":[115],"policies":[116],"one":[119],"application":[120],"another's":[123],"In":[126],"addition,":[127],"we":[128],"review":[129],"detail":[131],"permissions":[133],"given":[134],"installers,":[137],"alternative":[139],"approaches":[140],"secure":[142],"software":[143],"installation.":[144]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2016,"cited_by_count":5},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
