Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,725 papers from all fields of science
Search
Sign In
Create Free Account
Linux Security Modules
Known as:
LSM
, Linux Security Module
Linux Security Modules (LSM) is a framework that allows the Linux kernel to support a variety of computer security models while avoiding favoritism…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Access Linux Platform
Access control
AppArmor
Comparison of operating system kernels
Expand
Broader (1)
Linux
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Android security framework: extensible multi-layered access control on Android
M. Backes
,
Sven Bugiel
,
S. Gerling
,
Philipp von Styp-Rekowsky
Asia-Pacific Computer Systems Architecture…
2014
Corpus ID: 2068395
We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the…
Expand
2010
2010
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments
Valérie Viet Triem Tong
,
A. Clark
,
L. Mé
J. Wirel. Mob. Networks Ubiquitous Comput…
2010
Corpus ID: 16246926
In this paper we present a model for defining and enforcing a fine-grained information flow policy. We describe how the policy…
Expand
2009
2009
Reflections on the virtues of modularity: a case study in linux security modules
A. Blaich
,
D. Thain
,
A. Striegel
Software, Practice & Experience
2009
Corpus ID: 11945497
Developing a modular system that properly supports a range of security models is challenging. The work presented here details our…
Expand
2009
2009
Using a Linux Security Module for Contest Security
Bruce Merry
2009
Corpus ID: 55823514
The goal of a programming contest grading system is to take unknown code and execute it on test data. Since the code is…
Expand
2007
2007
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
David Kyle
,
J. Brustoloni
Scalable Trusted Computing
2007
Corpus ID: 15801004
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted…
Expand
2006
2006
A Network Safety-Defense Mechanism with the Linux Security Module
Jichiang Tsai
,
Chung-Hsin Feng
,
Chuyuan Tsai
IEEE Region 10 Conference
2006
Corpus ID: 44606088
With the increasing popularity of the Internet, more and more applications are extensively exploited on it. In the wake of that…
Expand
Highly Cited
2004
Highly Cited
2004
Consistency analysis of authorization hook placement in the Linux security modules framework
T. Jaeger
,
A. Edwards
,
Xiaolan Zhang
TSEC
2004
Corpus ID: 733912
We present a consistency analysis approach to assist the Linux community in verifying the correctness of authorization hook…
Expand
2004
2004
Linux Security Modules Enhancements : Module Stacking Framework and TCP State Transition Hooks for State-Driven NIDS
M. Quaritsch
2004
Corpus ID: 15742664
Until the availability of Kernel 2.6 the Linux operating system lacked general support to integrate security mechanisms into the…
Expand
Highly Cited
2003
Highly Cited
2003
Implementing SELinux as a Linux Security Module
Stephen Dale Smalley
,
C. Vance
,
W. Salamon
2003
Corpus ID: 61140065
Highly Cited
2003
Highly Cited
2003
Analyzing Integrity Protection in the SELinux Example Policy
T. Jaeger
,
R. Sailer
,
Xiaolan Zhang
USENIX Security Symposium
2003
Corpus ID: 16249575
In this paper, we present an approach for analyzing the integrity protection in the SELinux example policy. The SELinux example…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required