Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Linux Security Modules

Known as: LSM, Linux Security Module 
Linux Security Modules (LSM) is a framework that allows the Linux kernel to support a variety of computer security models while avoiding favoritism… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
The goal of a programming contest grading system is to take unknown code and execute it on test data. Since the code is… Expand
  • table 1
Is this relevant?
2007
2007
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted… Expand
  • figure 1
  • figure 2
Is this relevant?
2006
2006
With the increasing popularity of the Internet, more and more applications are extensively exploited on it. In the wake of that… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
We present an implementation of mandatory access control for Linux network communications that restricts socket access to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
  • Niki A. Rahimi
  • USENIX Annual Technical Conference, FREENIX Track
  • 2004
  • Corpus ID: 6162160
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on… Expand
Is this relevant?
2004
2004
We present a consistency analysis approach to assist the Linux community in verifying the correctness of authorization hook… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The access control mechanisms of existing mainstream operating systems are inadequate to provide strong system security. Enhanced… Expand
  • figure 2
  • figure 1
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
 
  • table 1
  • table 2
  • table 3
  • table 5
  • table 6
Is this relevant?
2001
2001
Security-enhanced Linux incorporates a strong, flexible mandatory access control architecture into Linux. It provides a mechanism… Expand
Is this relevant?