{"id":"https://openalex.org/W2064132320","doi":"https://doi.org/10.1145/1400097.1400101","title":"Plan 9 authentication in Linux","display_name":"Plan 9 authentication in Linux","publication_year":2008,"publication_date":"2008-07-01","ids":{"openalex":"https://openalex.org/W2064132320","doi":"https://doi.org/10.1145/1400097.1400101","mag":"2064132320"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1400097.1400101","pdf_url":null,"source":{"id":"https://openalex.org/S50071195","display_name":"ACM SIGOPS Operating Systems Review","issn_l":"0163-5980","issn":["0163-5980","1943-586X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://gsoc.cat-v.org/people/ashwin/p9authLinux.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102751908","display_name":"Ashwin Ganti","orcid":"https://orcid.org/0009-0002-7701-8519"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ashwin Ganti","raw_affiliation_strings":["Google Inc."],"affiliations":[{"raw_affiliation_string":"Google Inc.","institution_ids":["https://openalex.org/I1291425158"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5102751908"],"corresponding_institution_ids":["https://openalex.org/I1291425158"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.771724,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":74,"max":76},"biblio":{"volume":"42","issue":"5","first_page":"27","last_page":"33"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9972,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Distributed Storage Systems and Network Coding","score":0.9933,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.7867576},{"id":"https://openalex.org/keywords/port","display_name":"Port (circuit theory)","score":0.539785},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5254704},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.500553}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8399782},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.7867576},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6925802},{"id":"https://openalex.org/C32802771","wikidata":"https://www.wikidata.org/wiki/Q2443617","display_name":"Port (circuit theory)","level":2,"score":0.539785},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5254704},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.5234277},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49467847},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.4566627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42501828},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41817614},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3577544},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1400097.1400101","pdf_url":null,"source":{"id":"https://openalex.org/S50071195","display_name":"ACM SIGOPS Operating Systems Review","issn_l":"0163-5980","issn":["0163-5980","1943-586X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.674.7450","pdf_url":"http://gsoc.cat-v.org/people/ashwin/p9authLinux.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.674.7450","pdf_url":"http://gsoc.cat-v.org/people/ashwin/p9authLinux.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.4,"id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation","award_id":"6.28E+12"}],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W1526649648","https://openalex.org/W1590096238","https://openalex.org/W1591051730","https://openalex.org/W2026879388","https://openalex.org/W2113201593","https://openalex.org/W2136119519","https://openalex.org/W2913153438","https://openalex.org/W6385438"],"related_works":["https://openalex.org/W4315650027","https://openalex.org/W4308642904","https://openalex.org/W4256170434","https://openalex.org/W4243085862","https://openalex.org/W4238894392","https://openalex.org/W4238771742","https://openalex.org/W4235839583","https://openalex.org/W4235220108","https://openalex.org/W4233948907","https://openalex.org/W2357607877"],"abstract_inverted_index":{"In":[0,26],"Linux,":[1],"applications":[2,63,120],"like":[3,182],"su":[4,185],"and":[5,17,68,160,184,191],"login":[6,183],"currently":[7],"run":[8,194],"as":[9,36,64,140],"root":[10],"in":[11,76,121,201],"order":[12,122],"to":[13,82,108,123,179],"access":[14],"authentication":[15,80,106,158],"information":[16],"set":[18],"or":[19],"alter":[20],"the":[21,24,30,40,52,84,89,102,110,113,125,132,135,146,152,155,161,169,187],"identity":[22],"of":[23,91,104,112,134,154,163,171,197],"process.":[25],"such":[27,62],"cases,":[28],"if":[29],"application":[31,93],"is":[32,49,176],"compromised":[33],"while":[34],"running":[35],"a":[37,65,71,96,141,164],"privileged":[38],"user,":[39],"entire":[41],"system":[42,56,97],"can":[43],"become":[44],"vulnerable.":[45],"An":[46],"alternative":[47],"approach":[48,116],"taken":[50],"by":[51],"Plan":[53,114,136,156],"9":[54,115,137,157],"operating":[55],"from":[57,186],"Bell":[58],"Labs,":[59],"which":[60,167],"runs":[61],"non-privileged":[66],"user":[67,200],"relies":[69],"on":[70,195],"kernel-based":[72],"capability":[73,138],"device":[74,139,143],"working":[75],"coordination":[77],"with":[78,117],"an":[79,92,198],"server":[81,159],"provide":[83],"same":[85],"services.":[86],"This":[87,99],"avoids":[88],"risk":[90],"vulnerability":[94],"becoming":[95],"vulnerability.":[98],"paper":[100],"discusses":[101],"extension":[103],"Linux":[105,119,147,202],"mechanisms":[107],"allow":[109],"use":[111,170],"existing":[118],"reduce":[124],"security":[126],"risks":[127],"mentioned":[128],"earlier.":[129],"It":[130,149,175],"describes":[131,151],"port":[133,153],"character":[142],"driver":[144],"for":[145],"kernel.":[148],"also":[150],"implementation":[162],"PAM":[165],"module":[166],"allows":[168],"these":[172],"new":[173],"facilities.":[174],"now":[177],"possible":[178],"restrain":[180],"processes":[181],"uncontrolled":[188],"setuid":[189],"bit":[190],"make":[192],"them":[193],"behalf":[196],"unprivileged":[199],".":[203]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2064132320","counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2024-09-25T01:16:54.155738","created_date":"2016-06-24"}