期刊文献+

基于SELinux用户角色管理机制的改进探讨 被引量:1

Discussion on the Improvement of User's Role Management Mechanism Based on SELinux
下载PDF
导出
摘要 针对SELinux对用户身份管理功能存在安全隐患,将Linux组概念作为SELinux身份确定可选项,提出了解决不同用户之间不能灵活分配相同的角色集问题、用户在不同的角色之间设置转换模式不灵活问题及安全隐患问题的方法。 This paper discusses the security vulnerability group concept as options for identification, the author comes up role set and conversion modes among different users as well certain references. in SELinux's role management. Taking the Linux's with relevant solutions to the inflexible assignment of as to the security vulnerability and this paper have
作者 金京犬 杨忆
出处 《西昌学院学报(自然科学版)》 2016年第2期39-42,共4页 Journal of Xichang University(Natural Science Edition)
基金 安徽省高校自然科学基金项目"企业Linux服务器的安全应用研究"(KJ2016A382)
关键词 SELINUX RBAC SELinux安全体系结构 用户角色管理 SELinux RBAC SELinux security architecture user's role management
  • 相关文献

参考文献4

二级参考文献9

  • 1[1]Ray Spencer ,Stephen Smalley, Peter Loscocco and Mike Hibler, David Andersen, "The Flask Security Architecture: System Support for Diverse Security Policies" [j],NSA Technical Report ,February 2001.
  • 2[2]Peter Loscocco and Stephen Smalley, "Integrating Flexible Support forSecurity Policies into the Linux Operating System" [j], Proceedings of the FREENⅨ Track: 2001 USENⅨ Annual Technical Conference, The USENⅨ Association, June 2001.
  • 3[3]Peter Loscocco, Stephen Smalley, Patrick Muckelbauer, Ruth Taylor, S.Turner,and John Farrell, "The Inevitability of Failure: The Flawed Assumption of Security in Modem Computing Environments" [j],Proceedings of the 21st National Information Systems SecurityConference,October 1998.
  • 4LOSCOCCO P,SMALLEY S.Meeting critical security objectives with security-enhanced Linux. http://lwn.net/2001/features/OLS/pdf/pdf/selinux.pdf . 2008
  • 5TEO L,AHN G-J.Towards the specification of access control poli-cies on multiple operating systems[].Proceedings of theIEEE Workshop on Information Assurance and Security.2004
  • 6National Security Agency.SELinux Background. http://www.nsa.gov/selinux/info . 2008
  • 7Red Hat,Inc.Red Hat Enterprise Linux4:Red Hat SELinux Guide. http://www.redhat.com . 2008
  • 8SMALLEY S.Configuring the SELinux policy. http://www.nsa.gov/selinux/papers/ . 2008
  • 9Loscocco P,Smalley S.Integrating Flexible Support for Security Policies into the Linux Operating System[].Proceedings of the FREENIX Track:USENIX Annual Technical Conference.2001

共引文献13

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部