Toward a Real MLS/SELinux System for End Users: An Empirical Study

被引:0
|
作者
Blanc, Mathieu [1 ]
Clemente, Patrice [2 ]
Kissi, Steve-William [2 ]
机构
[1] CEA, DAM, DIF, F-91297 Arpajon, France
[2] LIFO EA, ENSI, Bourges 18020, France
关键词
Multi-Level Security; Confidentiality; Bell - La Padula; SELinux;
D O I
10.1109/CTS.2009.5067483
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Multi-Level Security (MLS) has been widely used in order to implement confidentiality policies inside organizations, especially into military ones. More recently, some works have been done about the use of MLS inside Security Enhanced Linux (SELinux) operating systems. The main motivation is to have MLS open source system without rewriting applications to work under such OS. Although the MLS mechanisms have been implemented at the operating system level, that doesn't imply that the system is usable, from an end-user point-of-view. In this paper, we survey the state of the art and technology about the support of MLS under SELinux operating systems. Keeping in mind the main objectives of MLS (i.e., preventing information flows between users), we will deeply experiment OS level mechanisms for MLS control and applications compatibility with such controls. We will discuss remaining issues and future directions to explore.
引用
收藏
页码:209 / +
页数:2
相关论文
共 50 条
  • [41] An empirical study on green practices of mobile phone users
    Iosif Androulidakis
    Vitaly Levashenko
    Elena Zaitseva
    Wireless Networks, 2016, 22 : 2203 - 2220
  • [42] Users' Perspective of Smartphone Platforms Usability: An Empirical Study
    Ahmed, Amira
    Raza, Arif
    Sadik, Sarmad
    PROCEEDINGS FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2014, : 379 - 384
  • [43] An Empirical Study of How Users Adopt Famous Entities
    Yu, Sheng
    Kak, Subhash
    2012 INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT), 2012, : 64 - 69
  • [44] Internet users' information privacy concerns: An empirical study
    Connolly, Regina
    INFORMATION MANAGEMENT IN THE MODERN ORGANIZATIONS: TRENDS & SOLUTIONS, VOLS 1 AND 2, 2008, : 681 - 681
  • [45] An Empirical Study of End-to-End Temporal Action Detection
    Liu, Xiaolong
    Bai, Song
    Bai, Xiang
    2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 19978 - 19987
  • [46] The Design of Adaptive Acquisition of Users Feedback: an Empirical Study
    Almaliki, Malik
    Ncube, Cornelius
    Ali, Raian
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2014,
  • [47] Privacy Concerns of Mobile App Users: An Empirical Study
    Chennamaneni, Anitha
    Gupta, Babita
    AMCIS 2020 PROCEEDINGS, 2020,
  • [48] An Empirical Study on the Influence of Personalized Recommendation for Internet Users
    Oh, Chi-Hyon
    Honda, Katsuhiro
    Notsu, Akira
    Ichihashi, Hidetomo
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 1 - 5
  • [49] A STUDY OF END-USERS BEHAVIOR BY MEANS OF AN AUTOMATED ASSESSMENT METHOD (OR A BEHAVIOR TYPOLOGY OF END-USERS)
    FREITAS, H
    BALLAZ, B
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1993, 24 : 83 - 106
  • [50] End Users' Perception on Public WiFi System-A Study Conducted in Kuala Lumpur, Malaysia
    Kunachagaran, Kamalakannan
    Govindaraju, Vimala
    Ramakrishnan, Suresh
    Hishan, Sanil S.
    ADVANCED SCIENCE LETTERS, 2017, 23 (09) : 9265 - 9270