Presentation 2015-11-27
Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language
Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) SELinux is an effective MAC system for preventing damage from spreading after security breaches. In this paper, we replace the authorization system of SELinux with our logic-based authorization system, and demonstrate its feasibility based on various performance evaluations. We also evaluate the impact of architectural changes to integrity and non-bypassability, and discuss about the safety and usefulness of our system.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Operating System / Access Control / SELinux / Logic-based Language
Paper # ICSS2015-44
Date of Issue 2015-11-19 (ICSS)

Conference Information
Committee ICSS
Conference Date 2015/11/26(2days)
Place (in Japanese) (See Japanese page)
Place (in English) AIST, Fukushima Renewable Energy Institute
Topics (in Japanese) (See Japanese page)
Topics (in English) Communication and System Security, etc.
Chair Yutaka Miyake(KDDI R&D Labs.)
Vice Chair Takashi Nishide(Univ. of Tsukuba) / Yoshiaki Shiraishi(Kobe Univ.)
Secretary Takashi Nishide(Mitsubishi Electric) / Yoshiaki Shiraishi(NII)
Assistant Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT)

Paper Information
Registration To Technical Committee on Information and Communication System Security
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language
Sub Title (in English)
Keyword(1) Operating System
Keyword(2) Access Control
Keyword(3) SELinux
Keyword(4) Logic-based Language
Keyword(5)
1st Author's Name Masaki Hashimoto
1st Author's Affiliation Institute of Information Security(IISEC)
2nd Author's Name Minetoshi Takizawa
2nd Author's Affiliation Institute of Information Security(IISEC)
3rd Author's Name Fumihiko Takayama
3rd Author's Affiliation Institute of Information Technology, Inc.(IIT)
4th Author's Name Hidenori Tsuji
4th Author's Affiliation Institute of Information Security(IISEC)
5th Author's Name Hidehiko Tanaka
5th Author's Affiliation Institute of Information Security(IISEC)
Date 2015-11-27
Paper # ICSS2015-44
Volume (vol) vol.115
Number (no) ICSS-334
Page pp.pp.55-60(ICSS),
#Pages 6
Date of Issue 2015-11-19 (ICSS)