AppArmor

Known as: App Armor, AppArmour 
AppArmor ("Application Armor") is a Linux kernel security module that allows the system administrator to restrict programs' capabilities with per… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2007-2017
01220072017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Virtualization is the underpinning technology enabling cloud computing service provisioning, and container-based virtualization… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2016
2016
Docker which is a lightweight containerization tool has enabled DevOps to build and run applications in distributed environment… (More)
  • figure 1
  • table 1
Is this relevant?
2016
2016
In presence of known and unknown vulnerabilities in code and flow control of programs, virtual machine alike isolation to confine… (More)
  • figure 1
  • table I
  • table II
  • table III
Is this relevant?
2015
2015
Over the last few years, the use of virtualization technologies has increased dramatically. This makes the demand for efficient… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2012
2012
A number of security mechanisms are available for improving the security of systems by restricting the actions of individual… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
2011
2011
Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional security… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • table I
Is this relevant?
2011
2011
Most of today's MAC implementations can be turned into permissive mode, where no enforcement is performed but alerts are raised… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Review
2010
Review
2010
The number of threats to computers attached to networks continually increases. The focus of preventing security exploits has been… (More)
  • table 2.1
  • figure 2.1
  • figure 2.2
  • table 3.1
  • table 3.2
Is this relevant?
2009
2009
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems… (More)
  • figure 1
  • figure 9
  • figure 10
  • figure 11
  • figure 12
Is this relevant?
2007
2007
  • 2007
Traditional discretionary access control mechanisms do not differentiate between a user’s running applications–hence they provide… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?