Significant progress toward general acceptance of applying mandatory access control to systems has been made recently. Security Enhanced Linux (SELinux), in particular, has been enabled by default in some Linux distributions for several years. However, current SELinux deployments only effectively control a single system. Inter-system and remote resource access control capabilities are starting to appear in SELinux, but extending policy management capabilities to cover these networked systems remains an open problem. This paper discusses issues that must be addressed to support security policies distributed across a network, including policy development changes needed to be able to express a coherent security policy for a network of systems,...
Collaborative work needs a flexible secured networking management tool, as virtual teams can be form...
Whether a particular computing installation meets its security goals depends on whether the administ...
This work is engaged in access control mechanism in GNU/Linux operating systems. At first discretion...
Abstract—An operating system designed under the criteria of the class A1, consists of a collection o...
Usage of Network services and network stack-based applications on Linux systems are increasing rapi...
The challenge of maintaining a secure and usable sys-tem in a hostile environment makes self-defendi...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
An increasing number ofattacks experienced in existing enterprise networks and applications have rec...
The evolution of technological progress continually presents new information security challenges for...
Expressing security architectures that meet required security goals for a system in SELinux policy l...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
Security Enhanced Linux (SELinux) [18] has evolved rapidly over the last few years, with many enhanc...
Ab5troct- In the past, operating systems tended to lack well-defined access control policy specifica...
This paper presents a formal model, called SELAC, for analyzing an arbitrary security policy configu...
SELinux security policies are powerful tools to implement properties such as process confinement and...
Collaborative work needs a flexible secured networking management tool, as virtual teams can be form...
Whether a particular computing installation meets its security goals depends on whether the administ...
This work is engaged in access control mechanism in GNU/Linux operating systems. At first discretion...
Abstract—An operating system designed under the criteria of the class A1, consists of a collection o...
Usage of Network services and network stack-based applications on Linux systems are increasing rapi...
The challenge of maintaining a secure and usable sys-tem in a hostile environment makes self-defendi...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
An increasing number ofattacks experienced in existing enterprise networks and applications have rec...
The evolution of technological progress continually presents new information security challenges for...
Expressing security architectures that meet required security goals for a system in SELinux policy l...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
Security Enhanced Linux (SELinux) [18] has evolved rapidly over the last few years, with many enhanc...
Ab5troct- In the past, operating systems tended to lack well-defined access control policy specifica...
This paper presents a formal model, called SELAC, for analyzing an arbitrary security policy configu...
SELinux security policies are powerful tools to implement properties such as process confinement and...
Collaborative work needs a flexible secured networking management tool, as virtual teams can be form...
Whether a particular computing installation meets its security goals depends on whether the administ...
This work is engaged in access control mechanism in GNU/Linux operating systems. At first discretion...