Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in prac-tice requires effective policy engineering. We have found that the reigning SELinux model fares poorly in this regard, partly because typical isolation goals are not directly stated but instead are properties derivable from the type definitions by complicated analysis tools. Instead, we are experiment-ing with a security-policy approach based on copy-on-write “pastures”, in which the sharing of resources between pas-tures is the fundamental security policy primitive. We argue that it has a number of properties that are better from the usability point of view. We implemente...
Despite the availability of powerful mechanisms for security policy and access control, real-world i...
Security policies determine which security requirements have to be met in a domain and how they are ...
Modern distributed systems are composed from several off-the-shelf components, including operating s...
Expressing security architectures that meet required security goals for a system in SELinux policy l...
Abstract—An operating system designed under the criteria of the class A1, consists of a collection o...
Significant progress toward general acceptance of applying mandatory access control to systems has b...
This thesis deals with technologies of SELinux security policy writing. Furthermore the thesis analy...
The goal of this thesis is to describe principles of SELinux technology. Thesis examines and comment...
Most of the statements in the current SELinux policy language operate directly on features of the un...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
Security policy for SELinux is usually created by customizing a sample policy called refpolicy. Howe...
This paper presents a formal model, called SELAC, for analyzing an arbitrary security policy configu...
NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for sec...
SELinux security policies are powerful tools to implement properties such as process confinement and...
To minimize the damage in the event of a security breach it is desirable to limit the privileges of ...
Despite the availability of powerful mechanisms for security policy and access control, real-world i...
Security policies determine which security requirements have to be met in a domain and how they are ...
Modern distributed systems are composed from several off-the-shelf components, including operating s...
Expressing security architectures that meet required security goals for a system in SELinux policy l...
Abstract—An operating system designed under the criteria of the class A1, consists of a collection o...
Significant progress toward general acceptance of applying mandatory access control to systems has b...
This thesis deals with technologies of SELinux security policy writing. Furthermore the thesis analy...
The goal of this thesis is to describe principles of SELinux technology. Thesis examines and comment...
Most of the statements in the current SELinux policy language operate directly on features of the un...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
Security policy for SELinux is usually created by customizing a sample policy called refpolicy. Howe...
This paper presents a formal model, called SELAC, for analyzing an arbitrary security policy configu...
NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for sec...
SELinux security policies are powerful tools to implement properties such as process confinement and...
To minimize the damage in the event of a security breach it is desirable to limit the privileges of ...
Despite the availability of powerful mechanisms for security policy and access control, real-world i...
Security policies determine which security requirements have to be met in a domain and how they are ...
Modern distributed systems are composed from several off-the-shelf components, including operating s...