Linux Distributed Security Module
نویسندگان
چکیده
Currently implemented security mechanisms rely on discretionary access control mechanisms. These mechanisms, however, are inadequate to protect against the various kinds of attacks in today's complex environments. The access decisions are based on user identity and ownership. Consequently, these mechanisms are easy to bypass and malicious applications can easily cause failures and breaches in system security.
منابع مشابه
Mandatory Access Control for Linux Clustered Servers
In today’s world, the use of computers and networks is growing and the vision of a single infrastructure for voice and data is becoming a reality. However, with different technologies and services using the same networking infrastructure, the realization of this vision requires higher levels of security to be implemented in computer systems. Current security solutions do not address all of the ...
متن کاملLinux Security Modules Enhancements: Module Stacking Framework and TCP State Transition Hooks for State-Driven NIDS
Until the availability of Kernel 2.6 the Linux operating system lacked general support to integrate security mechanisms into the kernel. The Linux Security Module Framework (LSM) was designed to overcome this limitation. Although LSM provides a solid baseline for kernel security, it lacks important features. In this paper two of these limitations are addressed: First a framework-managed module ...
متن کاملTrusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are available to solve such a problem at the application level of a system but very few are actually implemented into the kernel. The Linux Security Module project was aimed at applying security to the Linux kernel without i...
متن کاملBear: An Open-Source Virtual Secure Coprocessor based on TCPA
This paper reports on our ongoing project to use TCPA to transform a desktop Linux machine into a virtual secure coprocessor: more powerful but less secure than higher-end devices. We use TCPA hardware and modified boot loaders to protect fairly static components, such as a trusted kernel; we use an enforcer module—configured as Linux Security Module—to protected more dynamic system components;...
متن کاملImplementing a GDB Stub in Lightweight Kitten OS
Because of the increasing complexity of the applications running in Kitten, a lightweight HPC OS targeted for compute nodes of massively-parallel, distributed-memory supercomputers, and the complex hardware that Kitten is running on, bugs are becoming more difficult to find. As a result, the need for Kitten to support user-level application debugging becomes more critical. Unfortunately, Kitten...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002