[go: up one dir, main page]

Faden et al., 2022 - Google Patents

Case Study: Solaris Trusted Extensions

Faden et al., 2022

Document ID
3154583294544900981
Author
Faden G
Schuba C
Publication year
Publication venue
Operating System Security

External Links

Snippet

Abstract Solaris (TM) Trusted Extensions is a feature of the Sun Microsystems's Solaris operating system that enforces multilevel security (MLS) policies [23]. It is the latest in a series of MLS workstation and server operating systems that have been under development …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
US9917863B2 (en) Method and system for implementing mandatory file access control in native discretionary access control environments
Walker et al. Confining root programs with domain and type enforcement (DTE)
US8056119B2 (en) Method and system for controlling inter-zone communication
JP4809530B2 (en) Security model using restricted tokens
JP4625181B2 (en) Security location identification method and system
CN101366040B (en) Method and system for managing user access to a server containing objects
US20090282457A1 (en) Common representation for different protection architectures (crpa)
US20160342803A1 (en) Computer device and method for controlling access to a resource via a security system
Punithasurya et al. Analysis of different access control mechanism in cloud
US20030177376A1 (en) Framework for maintaining information security in computer networks
US20060193467A1 (en) Access control in a computer system
KR102214162B1 (en) A user-based object access control system using server's hooking
Balfanz et al. Windowbox: A simple security model for the connected desktop
CN100401223C (en) A Strategy and Method for Realizing Least Privilege Control in a Secure Operating System
Abou El Kalam et al. Access control for collaborative systems: A web services based approach
Faden et al. Case Study: Solaris Trusted Extensions
Ott The role compatibility security model
Faden Solaris trusted extensions
Xu et al. A study on confidentiality and integrity protection of SELinux
Snowberger et al. Sub-Identities: Toward Operating System Support for Distributed System Security
Runge SELinux: A new approach to secure systems
Brunette An Overview of Solaris 10 Operating System Security Controls
Cortes Active Directory security: Why we fail and what auditors miss
Estor et al. Mandatory Access Control & SELinux
Blanc et al. Protection of a shared hpc cluster