International audienceProtecting a HPC cluster against real world cyber threats is a critical task, with the increasing trend to open and share computing resources. As partners can upload data that is confidential regarding other partners, a company managing a shared cluster has to enforce strong security measures. It has to prevent both accidental data leakage and voluntary data stealing. When using an operating system based on Linux, the offered protections are difficult to set up in large scale environments. This article presents how to use the Mandatory Access Control feature of SELinux in order to guarantee strong security properties for HPC clusters. The proposed solution is based on the use of the Multi-Category System, the confinement ...
This thesis deals with mandatory access control in distributed systems. We present a novel approach ...
With the increasing use of clusters and distributed networks in industry, research, and scientific d...
The subject of this paper is data protection by means access control. It compares the difference bet...
International audienceHPC clusters are costly resources, hence nowadays these structures tend to be ...
International audienceThe security of shared High Performance Com- puting clusters is still an open ...
International audienceProtecting a shared High Performance Computing cluster is still an open resear...
International audienceThe protection of High Performance Computing architectures is still an open re...
International audienceModern operating systems continue to be the victims of attacks and information...
International audienceAssessing the impact of Mandatory Access Control (MAC) integration on the Linu...
In today’s world, the use of computers and net-works is growing and the vision of a single infrastru...
High Performance Computing facilities that use cluster computing to provide computational services t...
Securing the HPC infrastructure is an important task. The level of awareness regarding the importanc...
This master's thesis describes the problems of SELinux, and the methods of creation of a proper secu...
The investigation presented in this paper was prompted by the need to provide a manageablesolution f...
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MAC...
This thesis deals with mandatory access control in distributed systems. We present a novel approach ...
With the increasing use of clusters and distributed networks in industry, research, and scientific d...
The subject of this paper is data protection by means access control. It compares the difference bet...
International audienceHPC clusters are costly resources, hence nowadays these structures tend to be ...
International audienceThe security of shared High Performance Com- puting clusters is still an open ...
International audienceProtecting a shared High Performance Computing cluster is still an open resear...
International audienceThe protection of High Performance Computing architectures is still an open re...
International audienceModern operating systems continue to be the victims of attacks and information...
International audienceAssessing the impact of Mandatory Access Control (MAC) integration on the Linu...
In today’s world, the use of computers and net-works is growing and the vision of a single infrastru...
High Performance Computing facilities that use cluster computing to provide computational services t...
Securing the HPC infrastructure is an important task. The level of awareness regarding the importanc...
This master's thesis describes the problems of SELinux, and the methods of creation of a proper secu...
The investigation presented in this paper was prompted by the need to provide a manageablesolution f...
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MAC...
This thesis deals with mandatory access control in distributed systems. We present a novel approach ...
With the increasing use of clusters and distributed networks in industry, research, and scientific d...
The subject of this paper is data protection by means access control. It compares the difference bet...