A comparison between ConSA and current Linux security implementations

  • Authors:
  • Alexandre Hardy;Martin S. Olivier

  • Affiliations:
  • Computer Science, Rand Afrikaans University, PO Box 524, Auckland Park, Johannesburg, South Africa;Computer Science, Rand Afrikaans University, PO Box 524, Auckland Park, Johannesburg, South Africa

  • Venue:
  • Das'01 Proceedings of the fifteenth annual working conference on Database and application security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

There are many extensions to the Linux security model that are available. ConSA [1] aims to provide a configurable architecture, and should allow many security systems to be implemented. A prototype ConSA system has been implemented in Linux. This paper will examine how ConSA relates to currently available Linux security extensions.