Skip to Main Content
With the development of information technology and the wide spread application of internet, information system is playing an important role in human society. Furthermore, operating system, which is the base of information system, manages the computer resources directly, so the security of operating system is the base of the security of information system. SELinux sub-system can enforce a policy based on robust Mandatory Access Control (MAC) and provide flexible security policy configuration, which allows for greater overall system security. Today, it is good reference for our research and development a security independent operating system. However, the policy configuration of SELinux is very powerful and complicated, which limit the scope of its application. Therefore, the research of the security policy and the analysis of the security consistency of policies are of great value.