A trusted mobile phone reference architecturevia secure kernel
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Security enhanced Linux to enforce mandatory access control in health information systems
HDKM '08 Proceedings of the second Australasian workshop on Health data and knowledge management - Volume 80
Behavioral attestation for web services (BA4WS)
Proceedings of the 2008 ACM workshop on Secure web services
Model-Driven Configuration of SELinux Policies
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II
Proceedings of the 3rd international conference on Security of information and networks
Automatic OS kernel TCB reduction by leveraging compile-time configurability
HotDep'12 Proceedings of the Eighth USENIX conference on Hot Topics in System Dependability
Behavioral Attestation for Web Services Based Business Processes
International Journal of Web Services Research
Behavioral Attestation for Web Services using access policies
Multimedia Tools and Applications
Hi-index | 0.00 |
SELinux: Bring World-Class Security to Any Linux Environment!SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies- including the powerful new Reference Policy-showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5.· Thoroughly understand SELinux's access control and security mechanisms· Use SELinux to construct secure systems from the ground up· Gain fine-grained control over kernel resources· Write policy statements for type enforcement, roles, users, and constraints· Use optional multilevel security to enforce information classification and manage users with diverse clearances· Create conditional policies that can be changed on-the-fly· Define, manage, and maintain SELinux security policies· Develop and write new SELinux security policy modules· Leverage emerging SELinux technologies to gain even greater flexibility· Effectively administer any SELinux system