Faden et al., 2022 - Google Patents
Case Study: Solaris Trusted ExtensionsFaden et al., 2022
- Document ID
- 3154583294544900981
- Author
- Faden G
- Schuba C
- Publication year
- Publication venue
- Operating System Security
External Links
Snippet
Abstract Solaris (TM) Trusted Extensions is a feature of the Sun Microsystems's Solaris operating system that enforces multilevel security (MLS) policies [23]. It is the latest in a series of MLS workstation and server operating systems that have been under developmentĀ ā¦
- 230000035945 sensitivity 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9917863B2 (en) | Method and system for implementing mandatory file access control in native discretionary access control environments | |
Walker et al. | Confining root programs with domain and type enforcement (DTE) | |
US8056119B2 (en) | Method and system for controlling inter-zone communication | |
JP4809530B2 (en) | Security model using restricted tokens | |
JP4625181B2 (en) | Security location identification method and system | |
CN101366040B (en) | Method and system for managing user access to a server containing objects | |
US20090282457A1 (en) | Common representation for different protection architectures (crpa) | |
US20160342803A1 (en) | Computer device and method for controlling access to a resource via a security system | |
Punithasurya et al. | Analysis of different access control mechanism in cloud | |
US20030177376A1 (en) | Framework for maintaining information security in computer networks | |
US20060193467A1 (en) | Access control in a computer system | |
KR102214162B1 (en) | A user-based object access control system using server's hooking | |
Balfanz et al. | Windowbox: A simple security model for the connected desktop | |
CN100401223C (en) | A Strategy and Method for Realizing Least Privilege Control in a Secure Operating System | |
Abou El Kalam et al. | Access control for collaborative systems: A web services based approach | |
Faden et al. | Case Study: Solaris Trusted Extensions | |
Ott | The role compatibility security model | |
Faden | Solaris trusted extensions | |
Xu et al. | A study on confidentiality and integrity protection of SELinux | |
Snowberger et al. | Sub-Identities: Toward Operating System Support for Distributed System Security | |
Runge | SELinux: A new approach to secure systems | |
Brunette | An Overview of Solaris 10 Operating System Security Controls | |
Cortes | Active Directory security: Why we fail and what auditors miss | |
Estor et al. | Mandatory Access Control & SELinux | |
Blanc et al. | Protection of a shared hpc cluster |