Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
The protection mechanisms of current mainstream op erating systems are inadequate to support confidentiality and integrity requirements for end systems.
This paper describes the security architecture, security mechanisms, application programming interface, security policy configuration, and performance of ...
People also ask
Abstract. The protection mechanisms of current mainstream op- erating systems are inadequate to support confidential- ity and integrity requirements for end ...
A generalized framework for access control: an informal description. In Proceedings of the Thirteenth National Computer Security Conference, pages 135-143, Oct ...
Enhance policy tools and infrastructure. • Integrate with nonMAC policies (e.g. Crypto). • Enhance revocation support. • Develop flexible trusted path mechanism ...
This paper will introduce the NSA's research project termed "Security-enhanced" Linux, a modification of the kernel to include a "security server"
Integrating Flexible Support for Security Policies into the Linux Operating System Abstract ... Support for Security Policies into the Linux Operating System ...
About this document ... Integrating Flexible Support for Security Policies into the Linux Operating System. This document was generated using the LaTeX2HTML ...
"Integrating Flexible Support for Security Policies into the Linux Operating System", by Peter Loscocco and Stephen Smalley. This paper was originally ...
Red Hat developed a new mechanism for flexible network access controls called. SECMARK, which combined the power of the Linux packet filtering framework with.