Systematic policy analysis for high-assurance services in SELinux

Gail Joon Ahn, Wenjuan Xu, Xinwen Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Abstract

Identifying and protecting the trusted computing base (TCB) of a system is an important task to provide high-assurance services since a set of trusted subjects should be legitimately articulated for target applications. In this paper, we present a formal policy analysis framework to identify TCB with the consideration of specific security goals. We also attempt to model information flows between domains in SELinux policies and detect security violations among information flows using Colored Petri Nets.

Original languageEnglish (US)
Title of host publicationProceedings - 2008 IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008
Pages3-10
Number of pages8
DOIs
StatePublished - Sep 22 2008
Externally publishedYes
Event9th IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008 - Palisades, NY, United States
Duration: Jun 2 2008Jun 4 2008

Publication series

NameProceedings - 2008 IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008

Other

Other9th IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008
CountryUnited States
CityPalisades, NY
Period6/2/086/4/08

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'Systematic policy analysis for high-assurance services in SELinux'. Together they form a unique fingerprint.

Cite this