Algorithms for Automatic Analysis of SELinux Security Policy

被引:0
|
作者
Zhai, Gaoshou [1 ]
Wu, Tong [1 ]
Bai, Jing [1 ]
Guo, Tao [1 ]
Li, Tianyou [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2013年 / 7卷 / 01期
关键词
Validity analysis; Integrity analysis; Security policy; SELinux; Access control; Secure operating systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Configuration of security policies is an important but complicated work for running of secure operating systems. On the one hand, completely correct and consistent configuration is the necessary prerequisite for secure and credible system operation. On the other hand, errors and bugs are incidental anywhere within configuration at all time. Therefore, algorithms for automatic analysis of SELinux security policy are studied in this paper. Based on an improved analysis model similar to SELAC model, both algorithms for validity analysis and integrity analysis are designed. So that any access relations among subjects and objects with specified security contexts can be identified correctly by using the former algorithm. And all rules that could potentially influence integrity of subjects and objects can be detected based on the latter algorithm. Furthermore, a corresponding prototype is implemented in C Language and a security policy configuration as to an application system called Student-Teacher system is designed based on the architecture of reference policy in order to test the prototype. Results are satisfactory and it shows that related algorithms are potential to be used to build an appropriate tool to assist people to perform configuration work and to complete correct and reliable configuration.
引用
收藏
页码:71 / 83
页数:13
相关论文
共 50 条
  • [41] Analysis and Implementation of Security Algorithms for Wireless Communications
    Ali, Abdinasir Hassan
    Masrom, Maslin
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 2, 2010, : 430 - 434
  • [42] Performance Analysis of Encryption Algorithms for Information Security
    Ramesh, A.
    Suruliandi, A.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 840 - 844
  • [44] Automatic Generation of Content Security Policy to Mitigate Cross Site Scripting
    Mhana, Samer Attallah
    Din, Jamilah Binti
    Atan, Rodziah Binti
    PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH) - INFORMATION SCIENCE FOR GREEN SOCIETY AND ENVIRONMENT, 2016, : 324 - 328
  • [45] Analysis of Ramp Estimation Algorithms in Automatic Transmission
    Tian Yuan-suo
    Ding Zhizhong
    Wang Qiong
    Sun Baoqun
    MANUFACTURING SCIENCE AND TECHNOLOGY, PTS 1-8, 2012, 383-390 : 5268 - +
  • [46] Analysis of Ramp Estimation Algorithms in Automatic Transmission
    Tian Yuan-suo
    Ding Zhi-zhong
    Wang Qiong
    Sun Bao-qun
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3841 - +
  • [47] Comparative Analysis of Automatic Exudate Detection Algorithms
    Sopharak, Akara
    Uyyanonvara, Bunyarit
    Barman, Sarah
    Williamson, Thomas
    WORLD CONGRESS ON ENGINEERING, WCE 2010, VOL I, 2010, : 738 - 741
  • [48] Automatic ionospheric layers detection: Algorithms analysis
    Molina, Maria G.
    Zuccheretti, Enrico
    Cabrera, Miguel A.
    Bianchi, Cesidio
    Sciacca, Umberto
    Baskaradas, James
    ADVANCES IN SPACE RESEARCH, 2016, 57 (06) : 1360 - 1372
  • [49] Towards an automatic analysis of web service security
    Chevalier, Yannick
    Lugiez, Denis
    Rusinowitch, Michael
    FRONTIERS OF COMBINING SYSTEMS, PROCEEDINGS, 2007, 4720 : 133 - +
  • [50] AUTOMATIC AVERAGE-CASE ANALYSIS OF ALGORITHMS
    FLAJOLET, P
    SALVY, B
    ZIMMERMANN, P
    THEORETICAL COMPUTER SCIENCE, 1991, 79 (01) : 37 - 109