Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Switchblade: enforcing dynamic personalized system call models
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
SMASH: Modular Security for Mobile Agents
Software Engineering for Multi-Agent Systems V
Secure web-based retrieval of documents with usage controls
Proceedings of the 2009 ACM symposium on Applied Computing
A specification language for information security policies
CIS'09 Proceedings of the international conference on Computational and information science 2009
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Adjustable autonomy for cross-domain entitlement decisions
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Teaching access control with domain type enforcement
Journal of Computing Sciences in Colleges
A security architecture for adapting multiple access control models to operating systems
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Information flow query and verification for security policy of security-enhanced linux
IWSEC'06 Proceedings of the 1st international conference on Security
A comparison of secure multi-tenancy architectures for filesystem storage clouds
Middleware'11 Proceedings of the 12th ACM/IFIP/USENIX international conference on Middleware
An implementation study of a ghost drive: hidden file store in a filesystem
Proceedings of the 27th Annual ACM Symposium on Applied Computing
DTEvisual: a visualization system for teaching access control using Domain Type Enforcement
Journal of Computing Sciences in Colleges
Multimedia Applications and Security in MapReduce: Opportunities and Challenges
Concurrency and Computation: Practice & Experience
Differentially private top-k query over MapReduce
Proceedings of the fourth international workshop on Cloud data management
A comparison of secure multi-tenancy architectures for filesystem storage clouds
Proceedings of the 12th International Middleware Conference
Behavioral Attestation for Web Services using access policies
Multimedia Tools and Applications
Hi-index | 0.00 |
This small but information-packed book covers the wide range of knowledge needed to secure your system using this respected extension to Linux. SELinux discusses critical topics, such as SELinux concepts and its security model; installation instructions; system and user administration; understanding, implementing, and developing your own SELinux security policies. With SELinux, a high-security computer is within reach of any system administrator, and this book provides the means.