Rule Based Analysis of Computer Security
Author(s)
Baldwin, Robert W.
DownloadMIT-LCS-TR-401.pdf (3.066Mb)
Metadata
Show full item recordAbstract
Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly writable and that mistake could allow ordinary users to acquire super-user privileges.
Date issued
1988-03Series/Report no.
MIT-LCS-TR-401