Toward a Real MLS/SELinux System for End Users: An Empirical Study

被引:0
|
作者
Blanc, Mathieu [1 ]
Clemente, Patrice [2 ]
Kissi, Steve-William [2 ]
机构
[1] CEA, DAM, DIF, F-91297 Arpajon, France
[2] LIFO EA, ENSI, Bourges 18020, France
关键词
Multi-Level Security; Confidentiality; Bell - La Padula; SELinux;
D O I
10.1109/CTS.2009.5067483
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Multi-Level Security (MLS) has been widely used in order to implement confidentiality policies inside organizations, especially into military ones. More recently, some works have been done about the use of MLS inside Security Enhanced Linux (SELinux) operating systems. The main motivation is to have MLS open source system without rewriting applications to work under such OS. Although the MLS mechanisms have been implemented at the operating system level, that doesn't imply that the system is usable, from an end-user point-of-view. In this paper, we survey the state of the art and technology about the support of MLS under SELinux operating systems. Keeping in mind the main objectives of MLS (i.e., preventing information flows between users), we will deeply experiment OS level mechanisms for MLS control and applications compatibility with such controls. We will discuss remaining issues and future directions to explore.
引用
收藏
页码:209 / +
页数:2
相关论文
共 50 条
  • [1] Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM
    Schreuders, Z. Cliffe
    McGill, Tanya
    Payne, Christian
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (02)
  • [2] On the Benefits of Providing Versioning Support for End Users: An Empirical Study
    Kuttal, Sandeep K.
    Sarma, Anita
    Rothermel, Gregg
    ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION, 2014, 21 (02)
  • [3] Look, real end users!
    Control, 2007, 10 (29):
  • [4] An empirical investigation of end-users' switching toward cloud computing: A two factor theory perspective
    Park, Sang Cheol
    Ryoo, Sung Yul
    COMPUTERS IN HUMAN BEHAVIOR, 2013, 29 (01) : 160 - 170
  • [5] Security Awareness of End-Users of Mobile Health Applications: An Empirical Study
    Bakheet, Aljedaani
    Aakash, Ahmad
    Mansooreh, Zahedi
    Ali, M. Babar
    PROCEEDINGS OF THE 17TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2020), 2021, : 125 - 136
  • [6] AN EMPIRICAL-STUDY ON END-USERS UPDATE PERFORMANCE FOR DIFFERENT ABSTRACTION LEVELS
    CHAN, HC
    WEI, KK
    SIAU, KL
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 1994, 41 (03) : 309 - 328
  • [7] Empirical study to understand marketing influence of environmental impact assessment on end users in UAE
    Shanmugan Joghee
    Sajal Kabiraj
    Swamynathan Ramakrishnan
    Haitham M. Alzoubi
    Muhammad Turki Alshurideh
    Digital Economy and Sustainable Development, 1 (1):
  • [8] Examining end users' ability to select business services: A conceptual framework and an empirical study
    Vitharana, Padmal
    Basu, Amiya
    INFORMATION & MANAGEMENT, 2020, 57 (06)
  • [9] An empirical study of Web personalization assistants supporting end-users in Web information systems
    Kim, K
    Carroll, JM
    Rosson, MB
    IEEE 2002 SYMPOSIA ON HUMAN CENTRIC COMPUTING LANGUAGES AND ENVIRONMENTS, PROCEEDINGS, 2002, : 60 - 62
  • [10] A Deductive Spreadsheet System for End Users
    Tallis, Marcelo
    Balzer, Robert M.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2010, 22 (11) : 1563 - 1576