Building computer systems that allow the controlled transfer of data between security domains, commonly called cross-domain solutions (CDS) or guards, presents many common and some unique security challenges. In this pa-per, we explore lessons learned from building several CDS systems on SELinux. We explore the desired security properties of a CDS, define the role of the operating system in enforcing these security properties, and describe our experience using SELinux to fulfill the operating system role. 1
In practicable multi-level secure systems it is necessary occasionally to transfer information in vi...
SELinux security policies are powerful tools to implement properties such as process confinement and...
SELinux ist eine Erweiterung für das Betriebssystem Linux, deren Einsatz eine Erhöhung der Systemsic...
Security Enhanced Linux (SELinux) [18] has evolved rapidly over the last few years, with many enhanc...
Expressing security architectures that meet required security goals for a system in SELinux policy l...
More and more critical services depend on computer networks and these networks are increasingly vuln...
This paper reflects a work in progress and will discuss issues in migrating applications from legacy...
This thesis makes a comparative study of the security systemsSystrace (used primarily with OpenBSD) ...
The decade of digitization and technology development has made computers an integral part of our liv...
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be us...
Abstract: The protection mechanisms of many mainstream operating systems were inadequate to support ...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
Significant progress toward general acceptance of applying mandatory access control to systems has b...
Bachelor thesis aims to explore and describe the basic principles of SELinux technology. SELinux or ...
This work is engaged in access control mechanism in GNU/Linux operating systems. At first discretion...
In practicable multi-level secure systems it is necessary occasionally to transfer information in vi...
SELinux security policies are powerful tools to implement properties such as process confinement and...
SELinux ist eine Erweiterung für das Betriebssystem Linux, deren Einsatz eine Erhöhung der Systemsic...
Security Enhanced Linux (SELinux) [18] has evolved rapidly over the last few years, with many enhanc...
Expressing security architectures that meet required security goals for a system in SELinux policy l...
More and more critical services depend on computer networks and these networks are increasingly vuln...
This paper reflects a work in progress and will discuss issues in migrating applications from legacy...
This thesis makes a comparative study of the security systemsSystrace (used primarily with OpenBSD) ...
The decade of digitization and technology development has made computers an integral part of our liv...
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be us...
Abstract: The protection mechanisms of many mainstream operating systems were inadequate to support ...
The protection mechanisms of current mainstream operating systems are inadequate to support confiden...
Significant progress toward general acceptance of applying mandatory access control to systems has b...
Bachelor thesis aims to explore and describe the basic principles of SELinux technology. SELinux or ...
This work is engaged in access control mechanism in GNU/Linux operating systems. At first discretion...
In practicable multi-level secure systems it is necessary occasionally to transfer information in vi...
SELinux security policies are powerful tools to implement properties such as process confinement and...
SELinux ist eine Erweiterung für das Betriebssystem Linux, deren Einsatz eine Erhöhung der Systemsic...