Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,872 papers from all fields of science
Search
Sign In
Create Free Account
Linux Security Modules
Known as:
LSM
, Linux Security Module
Linux Security Modules (LSM) is a framework that allows the Linux kernel to support a variety of computer security models while avoiding favoritism…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Access Linux Platform
Access control
AppArmor
Comparison of operating system kernels
Expand
Broader (1)
Linux
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Thin Hypervisor-Based User Authentication Mechanism for Linux Security Modules
Bin Yan
,
Pei Zhao
,
Hengtai Ma
,
Jian Zhai
2017
Corpus ID: 64552033
. LSM (Linux Security Modules) has been developed as a lightweight, general purpose, access control framework for the mainstream…
Expand
2010
2010
Maintaining the Correctness of the Linux Security Modules Framework
T. Jaeger
,
Xiaolan Zhang
,
A. Edwards
2010
Corpus ID: 7297862
In this paper, we present an approach, supported by software tools, for maintaining the correctness of the Linux Security Modules…
Expand
2010
2010
Survivable Storage Architecture
Zhang Wei
,
L. Shuguang
,
Zhong Weidong
Third International Symposium on Information…
2010
Corpus ID: 14699612
Basing on the idea of intrusion masking and defense-in-depth, a generic architecture of survivable storage system is presented…
Expand
2009
2009
Using a Linux Security Module for Contest Security
Bruce Merry
2009
Corpus ID: 55823514
The goal of a programming contest grading system is to take unknown code and execute it on test data. Since the code is…
Expand
2009
2009
Lothlorien: Mandatory Access Control using Linux Security Modules
K. Harsha
,
Bharath M. Palavalli
,
Shrisha Rao
,
Ashwin
IEEE International Conference on Internet…
2009
Corpus ID: 15346992
The concept of Mandatory Access Controls (MAC) enforces a security policy on users. Linux Security Modules (LSM) provides for…
Expand
2008
2008
Method to control the access to conditional access audio/video content
코린네 레부하느
,
이반 버브셀트
,
홀거 아이피패치
,
풀톤 라우라
2008
Corpus ID: 196088058
The present invention aims at solving the financial revenue loss due to the presence of digital video recorder that allow…
Expand
2007
2007
Method for validating access to a product by a security module
洛朗斯·帕里佐
2007
Corpus ID: 170047714
The invention relates to a method involving purchasing a product (P1) and checking that an amount associated with the product is…
Expand
2006
2006
subsequent implementation of a SIM function in a security module.
W. Rankl
,
D. Weiss
2006
Corpus ID: 86765994
Process for the subsequent implementation of a SIM function, a security module (3), with the aid of a mobile phone (1) allows the…
Expand
2005
2005
A memory management approach for swapless embedded systems
MA Lin
,
Ville Medeiros
,
R. Novellino
,
I. Biris
,
Edjard Mota
2005
Corpus ID: 56381265
Avoid the dreaded Out-of-Memory killer exception using these strategies for memory allocation.
2004
2004
The method of off operation and again on operation security module
ヴィルツ,クリスティアン
,
クデルスキ,エンリ
,
ハウエルト,パトリック
,
ブリック,オリヴィエ
2004
Corpus ID: 57880571
The present invention relates particularly to a method of off-operation and again on operation security module for managing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE