LOMAC: Low Water-Mark Integrity Protection for COTS Environments
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Component security: issues and an approach
COMPSAC-W'05 Proceedings of the 29th annual international conference on Computer software and applications conference
Transactions on computational science XI
Hi-index | 0.01 |
It is functionality other than security that was put in the first place when most systems and applications were built. The threats brought by Internet connectivity, downloaded code and loaded modules are obvious and dangerous and requires a kind of reliable integrityprotection. In this paper we present our mandatory integrity protection(RS-MIP) building in a secure Linux operating system kernel. We describe the security policy and integrity . model on which RS-MIP is based, its underlying implementation technology. In the end we compare it to other security protection approaches.