Presentation | 2015-11-27 Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | SELinux is an effective MAC system for preventing damage from spreading after security breaches. In this paper, we replace the authorization system of SELinux with our logic-based authorization system, and demonstrate its feasibility based on various performance evaluations. We also evaluate the impact of architectural changes to integrity and non-bypassability, and discuss about the safety and usefulness of our system. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Operating System / Access Control / SELinux / Logic-based Language |
Paper # | ICSS2015-44 |
Date of Issue | 2015-11-19 (ICSS) |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2015/11/26(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | AIST, Fukushima Renewable Energy Institute |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Communication and System Security, etc. |
Chair | Yutaka Miyake(KDDI R&D Labs.) |
Vice Chair | Takashi Nishide(Univ. of Tsukuba) / Yoshiaki Shiraishi(Kobe Univ.) |
Secretary | Takashi Nishide(Mitsubishi Electric) / Yoshiaki Shiraishi(NII) |
Assistant | Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language |
Sub Title (in English) | |
Keyword(1) | Operating System |
Keyword(2) | Access Control |
Keyword(3) | SELinux |
Keyword(4) | Logic-based Language |
Keyword(5) | |
1st Author's Name | Masaki Hashimoto |
1st Author's Affiliation | Institute of Information Security(IISEC) |
2nd Author's Name | Minetoshi Takizawa |
2nd Author's Affiliation | Institute of Information Security(IISEC) |
3rd Author's Name | Fumihiko Takayama |
3rd Author's Affiliation | Institute of Information Technology, Inc.(IIT) |
4th Author's Name | Hidenori Tsuji |
4th Author's Affiliation | Institute of Information Security(IISEC) |
5th Author's Name | Hidehiko Tanaka |
5th Author's Affiliation | Institute of Information Security(IISEC) |
Date | 2015-11-27 |
Paper # | ICSS2015-44 |
Volume (vol) | vol.115 |
Number (no) | ICSS-334 |
Page | pp.pp.55-60(ICSS), |
#Pages | 6 |
Date of Issue | 2015-11-19 (ICSS) |