Re: Running Untrusted Code in a Restricted Process

From: Don (don@research-cistw.saic.com)
Date: Fri Jun 16 2000 - 10:41:22 EST


> This idea is so simple that I'm suprised that I couldn't find any
> implementations after searching the web for a day.

There is a overview of various access control schemes and the differences
at http://research-cistw.saic.com/cace/. Several of the projects will probably
do what you want.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Fri Jun 23 2000 - 21:00:12 EST