A logical specification and analysis for SELinux MLS policy

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SELinux and MLS: Putting the Pieces Together

Multi-Level Security (MLS) has been implemented on many different operating systems. We will discuss the reasons and motivations behind the improvements to the MLS model in SELinux that were accepted into the 2.6.12 Linux Kernel. An introduction to SELinux MLS representation, policy creation, and integration is provided to help further the adoption and use of this technology.

متن کامل

Legacy MLS/Trusted Systems and SELinux – concepts and comparisons to simplify migration and adoption

2 Orange Book labeled systems – background........................................................................................ 3 2.1 Department of Defense security ............................................................................................... 3 2.2 Separate trusted and commercial versions................................................................................ 4 2.3 ...

متن کامل

A Logical Framework for XML Reference Specification

In this paper we focus on a (as much as possible) simple logic, called XHyb, expressive enough to allow the specification of the most common integrity constraints in XML documents. In particular we will deal with constraints on ID and IDREF(S) attributes, which are the common way of logically connecting parts of XML documents, besides the usual containment relation of XML elements.

متن کامل

Using Argumentation Logic for Firewall Policy Specification and Analysis

Firewalls are important perimeter security mechanisms that implement an organisation’s network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that network administrators have tools to translate their security requirements into firewall configuration rules and ensure that these rules are consistent with each other. In this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Information and System Security

سال: 2010

ISSN: 1094-9224,1557-7406

DOI: 10.1145/1805974.1805982