This paper reflects a work in progress and will discuss issues in migrating applications from legacy Multilevel Secure (MLS) systems to Security Enhanced Linux (SELinux). Initially, architectural similarities and differences will be discussed. This will provide a basis for discussing the actual migration of code from Trusted Solaris to SELinux. Although the examples in the paper are simple, they illustrate basic principles that will be used in porting code and performing policy work in moving applications from Trusted Solaris to SELinux. The areas covered are not exhaustive but do discuss how the main security features of sensitivity labels, process privileges, roles, and authorizations in Trusted Solaris map to SELinux. Additionally, areas...
The thesis analyzes the role of the audit2allow utility in troubleshooting Security-Enhanced Linux d...
This thesis makes a comparative study of the security systemsSystrace (used primarily with OpenBSD) ...
To minimize the damage in the event of a security breach it is desirable to limit the privileges of ...
Security Enhanced Linux (SELinux) [18] has evolved rapidly over the last few years, with many enhanc...
This paper discusses Security Enhanced Linux [1] (SELinux). First, I will outline some general aspec...
Abstract: The protection mechanisms of many mainstream operating systems were inadequate to support ...
Building computer systems that allow the controlled transfer of data between security domains, commo...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
In the modern computing world, a secure system is best implemented with mandatory access control (MA...
More and more critical services depend on computer networks and these networks are increasingly vuln...
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be us...
The goal of this thesis is to describe principles of SELinux technology. Thesis examines and comment...
This work is engaged in access control mechanism in GNU/Linux operating systems. At first discretion...
The decade of digitization and technology development has made computers an integral part of our liv...
International audienceMLS has been widely used in order to respect confidentiality policies inside o...
The thesis analyzes the role of the audit2allow utility in troubleshooting Security-Enhanced Linux d...
This thesis makes a comparative study of the security systemsSystrace (used primarily with OpenBSD) ...
To minimize the damage in the event of a security breach it is desirable to limit the privileges of ...
Security Enhanced Linux (SELinux) [18] has evolved rapidly over the last few years, with many enhanc...
This paper discusses Security Enhanced Linux [1] (SELinux). First, I will outline some general aspec...
Abstract: The protection mechanisms of many mainstream operating systems were inadequate to support ...
Building computer systems that allow the controlled transfer of data between security domains, commo...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
In the modern computing world, a secure system is best implemented with mandatory access control (MA...
More and more critical services depend on computer networks and these networks are increasingly vuln...
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be us...
The goal of this thesis is to describe principles of SELinux technology. Thesis examines and comment...
This work is engaged in access control mechanism in GNU/Linux operating systems. At first discretion...
The decade of digitization and technology development has made computers an integral part of our liv...
International audienceMLS has been widely used in order to respect confidentiality policies inside o...
The thesis analyzes the role of the audit2allow utility in troubleshooting Security-Enhanced Linux d...
This thesis makes a comparative study of the security systemsSystrace (used primarily with OpenBSD) ...
To minimize the damage in the event of a security breach it is desirable to limit the privileges of ...