2005
DOI: 10.3233/jcs-2005-13105
|View full text |Cite
|
Sign up to set email alerts
|

Verifying information flow goals in Security-Enhanced Linux

Abstract: In this paper, we present a systematic way to determine the information flow security goals achieved by systems running a secure O/S, specifically systems running Security-Enhanced Linux. A formalization of the access control mechanism of the SELinux security server, together with a labeled transition system representing an SELinux configuration, provides our framework. Information flow security goal statements expressed in linear temporal logic provide a clear description of the objectives that SELinux is int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
59
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(59 citation statements)
references
References 10 publications
0
59
0
Order By: Relevance
“…Guttman et al used model checking to find violations of information-flow requirements in SELinux policies [13]. They modeled the SELinux policy enforcement engine and the ways in which information may flow between multiple processes via a file system.…”
Section: Related Workmentioning
confidence: 99%
“…Guttman et al used model checking to find violations of information-flow requirements in SELinux policies [13]. They modeled the SELinux policy enforcement engine and the ways in which information may flow between multiple processes via a file system.…”
Section: Related Workmentioning
confidence: 99%
“…Guttman, Herzog, Ramsdell and Skorupka [18] present a systemic way to analyse access control policies in the Security-Enhanced Linux system (SELinux). They develop a highly abstract model of the SELinux operating system access control mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…To create the graph we use SLAT's [9], and PAL's [21] definition of information flow. First, we classify all permissions in two categories: read_like and write_like.…”
Section: Definition 21 (Information Flow Graphmentioning
confidence: 99%
“…First, many policy analyses have been constructed to evaluate security goals for a single MAC policy [9,21,27,22]. These analyses convert MAC policies into an information flow [7] graphs that represent which MAC labels can operate on (i.e., read or write) other MAC labels.…”
Section: Introductionmentioning
confidence: 99%