Legacy MLS/Trusted Systems and SELinux – concepts and comparisons to simplify migration and adoption
ثبت نشده
چکیده
2 Orange Book labeled systems – background........................................................................................ 3 2.1 Department of Defense security ............................................................................................... 3 2.2 Separate trusted and commercial versions................................................................................ 4 2.3 Little usage in commercial environments ................................................................................... 4
منابع مشابه
SELinux and MLS: Putting the Pieces Together
Multi-Level Security (MLS) has been implemented on many different operating systems. We will discuss the reasons and motivations behind the improvements to the MLS model in SELinux that were accepted into the 2.6.12 Linux Kernel. An introduction to SELinux MLS representation, policy creation, and integration is provided to help further the adoption and use of this technology.
متن کاملFormal Analysis on an Extended Security Model for Database Systems
In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security model for database systems is proposed. According to this method, analysis by using Coq proof assistant to ensure the correctness and security of the extended model is introduced. Our fo...
متن کاملUsing Complexity to Simplify Knowledge Translation; Comment on “Using Complexity and Network Concepts to Inform Healthcare Knowledge Translation”
Putting health theories, research and knowledge into practice is a challenge referred to as the knowledge-toaction gap. Knowledge translation (KT), and its related concepts of knowledge mobilization, implementation science and research impact, emerged to mitigate this gap. While the social interaction view of KT has gained currency, scholars have not easily made a link between KT and the concep...
متن کاملA practical approach to high assurance multilevel secure computing service
Current projects aimed at providing MLS computing services rarely seem to exploit advances in related fields. Specifically, the concepts of data distribution, replication, and interoperation are currently receiving much attention in the commercial database system sector but have yet to be applied to the delivery of MLS computing services. This paper explains how these concepts might help delive...
متن کاملSecurity Analysis in the Migration to Cloud Environments
Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most consistently raised as consumers look to m...
متن کامل