SELinux

Known as: Access vector cache, SE Linux, NSA Linux 
Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A new intrusion detection mechanism in SELinux based on dual-Markov chain and triggered by critical system calls is put forward… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table II
Is this relevant?
2011
2011
Security Enhanced Linux (SELinux) is a widely used Mandatory Access Control system which is integrated in the Linux kernel. It is… (More)
  • figure I
  • table 1
  • table 2
  • table I
Is this relevant?
2011
2011
Performing SELinux policy analyses can be difficult due to the complexity of the policy language and the sheer number of policy… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Since security has become an essential asset in numerous application areas, the integration of security policies has become a… (More)
  • figure 3
  • figure 2
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Google's Android framework incorporates an operating system and software stack for mobile devices. Using a general-purpose… (More)
  • figure 1
  • table 1
Is this relevant?
2010
2010
At the end of World War II, there was a rapid increase in irrigation over the Ogallala Aquifer in the Great Plains of the United… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2008
2008
Identifying and protecting the trusted computing base (TCB) of a system is an important task to provide high- assurance services… (More)
  • table 1
  • figure 2
  • table 2
  • figure 3
  • figure 5
Is this relevant?
2007
2007
Recent advances in the area of security-typed languages have enabled the development of realistic applications aware of… (More)
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper , we presentan approachfor analyzing the integrity protectionin theSELinuxexamplepolicy. The SELinux examplepolicy… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The protection mechanisms of current mainstream op­ erating systems are inadequate to support confidentiality and integrity… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?