SCIATool: A tool for analyzing selinux policies based on access control spaces, information flows and CPNs

6Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Although security policies configuration is crucial for operating systems to constrain applications’ operations and to protect the confidentiality and integrity of sensitive resources inside the systems, it is an intractable work for security administrators to accomplish correctly and consistently solely by hands. Thus policies analysis methods are becoming research hotspots. A great deal of such researches are focused on SELinux, which is a security-enhanced module of open-source and popular Linux. Among various analysis methods for SELinux policies, those based on access control spaces, information flows and colored Petri-nets (CPNs) can be thought as the three most valuable methods and they can be exploited together and complementarily. In this paper, a pro- totype of SELinux policies Configuration Integrated Analysis Tool, i.e. SCIA- Tool, is designed and implemented by integrating these three methods together. Test results are provided and further researches as to construct a computer-aided configuration tool for SELinux policies are discussed.

Cite

CITATION STYLE

APA

Zhai, G., Guo, T., & Huang, J. (2015). SCIATool: A tool for analyzing selinux policies based on access control spaces, information flows and CPNs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9473, pp. 294–309). Springer Verlag. https://doi.org/10.1007/978-3-319-27998-5_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free