作者: Neil Shipp , David Hetherington , Gavin Ackroyd , Jiahui Wang , Anand Menon
DOI:
关键词:
摘要: When a user inputs an action request, such as requested command, to be performed on target machine, management system receives the request and verifies it with separate authentication permission system. The verified command is sent machine. An worker machine accesses set of policies, local identify least privileged execution environment in which can performed. launches within identified