- Chapter 1: Overview
- Chapter 2: Solaris RBAC Implementation
- Chapter 3: Solaris Management Console Launcher
- Chapter 4: Trusted Solaris RBAC Implementation
- Chapter 5: Appendix 1--RBAC Example Instructions
- Chapter 6: Appendix 2--Comparison of the RBAC Implementation with Sudo
- Chapter 7: Resources
- Copyright Information
Chapter 7: Resources
Additional information about RBAC and the Solaris Operating Environment is available at http://www.sun.com. Specifically, these documents were consulted when writing this paper:
"Solaris 8 System Administration Supplement," Solaris 8 1/01 Update Collection, Sun Microsystems, Inc., 2001, docs.sun.com.
"System Administration Guide, Volume 2," Solaris 8 System Administrator Collection, Sun Microsystems, Inc., 2000, docs.sun.com.
"Trusted Solaris Administration Overview," Trusted Solaris 8 Answerbook, Sun Microsystems, Inc., 2000, docs.sun.com.
"Trusted Solaris 8 Operating Environment, A Technical Overview," Sun Microsystems, 2001, http://www.sun.com/software/whitepapers.html.
Additional Resources
These publications were also consulted when writing this paper:
Joshi, James; Ghafoor, Ari; Aref, Walid G.; and Spafford, Eugene H., "Digital Government Security Infrastructure Design Challenges," Computer Magazine, February, 2001.
Faden, Glenn, RBAC in UNIX Administration, Proceedings of the fourth Association for Computing Machinery (ACM) workshop on role-based access control, Pages 95–101, Sun Microsystems, 1999, http://www.acm.org/pubs/citations/proceedings/commsec/319171/p95-faden.