By Topic

Study on analysis for SELinux security policy

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jing Bai ; Sch. of Comput. & Inf. Technol., Beijing Jiaotong Univ., Beijing, China ; Gaoshou Zhai

With the development of information technology and the wide spread application of internet, information system is playing an important role in human society. Furthermore, operating system, which is the base of information system, manages the computer resources directly, so the security of operating system is the base of the security of information system. SELinux sub-system can enforce a policy based on robust Mandatory Access Control (MAC) and provide flexible security policy configuration, which allows for greater overall system security. Today, it is good reference for our research and development a security independent operating system. However, the policy configuration of SELinux is very powerful and complicated, which limit the scope of its application. Therefore, the research of the security policy and the analysis of the security consistency of policies are of great value.

Published in:

Systems and Informatics (ICSAI), 2012 International Conference on

Date of Conference:

19-20 May 2012