Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
127 | Yi-Ming Chen 0008, Yung-Wei Kao |
Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
information flow, security policy, Colored Petri Nets, SELinux |
119 | Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel |
A logical specification and analysis for SELinux MLS policy. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
policy compliance, SELinux, policy analysis, multi-level security |
101 | Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang |
Design and implementation of a tool for analyzing SELinux secure policy. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
security policy configuration, security policy description language, SELinux, integrity verification |
92 | Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert |
A trusted mobile phone reference architecturevia secure kernel. |
STC |
2007 |
DBLP DOI BibTeX RDF |
trusted mobile computing, security architecture, isolation, SELinux, secure kernel |
87 | Gail-Joon Ahn, Dhruv Gami |
Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
84 | Björn Vogel, Bernd Steinke |
Using SELinux security enforcement in Linux-based embedded devices. |
MOBILWARE |
2008 |
DBLP DOI BibTeX RDF |
security, embedded system, SELinux |
79 | Arpan Darivemula, Chokchai Leangsuksun, Anand Tikotekar, Makan Pourzandi |
Work in Progress: RASS Framework for a Cluster-Aware SELinux. |
CCGRID |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Giorgio Zanin, Luigi V. Mancini |
Towards a formal model for security policies specification and validation in the selinux system. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
security enhanced linux, configuration, formal model |
66 | Gail-Joon Ahn, Wenjuan Xu, Xinwen Zhang |
Systematic Policy Analysis for High-Assurance Services in SELinux. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
SELinux, Policy Analysis |
61 | Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli |
Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger |
Measuring integrity on mobile phone systems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
mobile phones, SELinux, integrity measurement |
52 | Takashi Horie, Toshiharu Harada, Kazuo Tanaka |
Adaptive Access Policy for the Linux Kernel. |
SAINT |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores |
A System for Distributed SELinux Policy Management. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Access, distributed, control, policies, administration, Kerberos, SELinux |
49 | Masoom Alam, Jean-Pierre Seifert, Qi Li 0002, Xinwen Zhang |
Usage control platformization via trustworthy SELinux. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
trusted computing, usage control, SELinux |
49 | Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli |
Automated Process Classi?cation Framework using SELinux Security Context. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
pcss, process classification using selinux security context, process classification framework, selniux |
44 | Berthold Agreiter, Ruth Breu |
Model-Driven Configuration of SELinux Policies. |
OTM Conferences (2) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn |
Visualization based policy analysis: case study in SELinux. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono |
Simplifying security policy descriptions for internet servers in secure operating systems. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
policy description, SELinux, internet server, secure operating system |
40 | Vikhyath Rao, Trent Jaeger |
Dynamic mandatory access control for multiple stakeholders. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
mobile phones, selinux, distributed access control |
40 | Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger |
Analysis of virtual machine system policies. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
xen security modules (xsm), virtual machines, selinux, policy analysis |
40 | SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han |
Design and Implementation of Fast Access Control That Supports the Separation of Duty. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Flask, Access control, RBAC, SELinux, DAC |
40 | Vinod Ganapathy, Trent Jaeger, Somesh Jha |
Automatic placement of authorization hooks in the linux security modules framework. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
LSM, hook placement, static analysis, SELinux |
35 | Jérémy Briffaut, Jean-François Lalande, Waleed W. Smari |
Team--Based MAC Policy over Security--Enhanced Linux. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Hiroaki Inoue, Akihisa Ikeno, Masaki Kondo, Junji Sakai, Masato Edahiro |
FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals. |
CODES+ISSS |
2005 |
DBLP DOI BibTeX RDF |
secure mobile terminal, chip multiprocessor, linux |
35 | Trent Jaeger, Reiner Sailer, Xiaolan Zhang 0001 |
Resolving constraint conflicts. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
access control models, constraint models, policy design |
35 | Trent Jaeger, Xiaolan Zhang 0001, Antony Edwards |
Policy management using access control spaces. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, Access control models |
26 | Divyam Pahuja, Alvin Tang, Klim Tsoutsman |
Automated SELinux RBAC Policy Verification Using SMT. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin |
IFCIL: An Information Flow Configuration Language for SELinux (Extended Version). |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin |
IFCIL: An Information Flow Configuration Language for SELinux. |
CSF |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yan Ding, Pan Dong, Zhipeng Li, Yusong Tan, Chenlin Huang, Lifeng Wei, Yudan Zuo |
SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization. |
Wirel. Commun. Mob. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
26 | B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar, Parjanya Vyas |
Consistency analysis and flow secure enforcement of SELinux policies. |
Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Jae-Yong Ko, Sang-Gil Lee, Cheol-Hoon Lee |
Real-time Mandatory Access Control on SELinux for Internet of Things. |
ICCE |
2019 |
DBLP DOI BibTeX RDF |
|
26 | B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar |
FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies. |
DBSec |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Xin-long Song, Chung-Huang Yang |
Mobile Device Management System Based on AOSP and SELinux. |
DSC |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Amir Eaman, Bahman Sistany, Amy P. Felty |
Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution. |
MCETECH |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Robert Gove |
V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policies. |
VizSEC |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Yuichi Nakamura 0005, Yoshiki Sameshima, Toshihiro Yamauchi |
Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems. |
J. Inf. Process. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Simone Mutti, Enrico Bacis, Stefano Paraboschi |
An SELinux-based intent manager for Android. |
CNS |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Peter Amthor 0001 |
A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. |
SECRYPT |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Gaoshou Zhai, Tao Guo, Jie Huang |
SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs. |
INTRUST |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Michele Paolino, Mian Muhammad Hamayun, Daniel Raho |
A Performance Analysis of ARM Virtual Machines Secured Using SELinux. |
CSP Forum |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn |
Visualization-based policy analysis for SELinux: framework and user study. |
Int. J. Inf. Sec. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Ananya Chatterjee, Arun Mishra |
Securing the Root Through SELinux. |
ICACNI |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Z. Cliffe Schreuders, Tanya Jane McGill, Christian Payne |
Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM. |
Int. J. Inf. Secur. Priv. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Patrice Clemente, Bangaly Kaba, Jonathan Rouzaud-Cornabas, Marc Alexandre, Guillaume Aujay |
SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack Logs. |
AMT |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Z. Cliffe Schreuders, Tanya Jane McGill, Christian Payne |
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM. |
ACM Trans. Inf. Syst. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Salem Benferhat, Khalid Bouriche, Mohamed Ouzarf |
Encoding default-based SELinux-security policy in Organization-Based Access Control Model. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
26 | Said Marouf, Mohamed Shehab |
SEGrapher: Visualization-based SELinux Policy Analysis. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Peter Amthor 0001, Winfried E. Kühnhauser, Anja Pölck |
Model-based safety analysis of SELinux security policies. |
NSS |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel |
A logical specification and analysis for SELinux MLS policy. |
ACM Trans. Inf. Syst. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Yuichi Nakamura 0005, Yoshiki Sameshima, Toshihiro Yamauchi |
SELinux Security Policy Configuration System with Higher Level Language. |
J. Inf. Process. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Asaf Shabtai, Yuval Fledel, Yuval Elovici |
Securing Android-Powered Mobile Devices Using SELinux. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Linda Markowsky |
An SELinux Sourcebook for Cybersecurity Educators. |
Security and Management |
2010 |
DBLP BibTeX RDF |
|
26 | Jaroslav Janácek |
Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism. |
NDT (1) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Said Marouf, Doan Minh Phuong, Mohamed Shehab |
A learning-based approach for SELinux policy optimization with type mining. |
CSIIRW |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Mathieu Blanc, Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard |
Classification of Malicious Distributed SELinux Activities. |
J. Comput. |
2009 |
DBLP BibTeX RDF |
|
26 | Mathieu Blanc, Patrice Clemente, Steve-William Kissi |
Toward a real MLS/SELinux system for end users: An empirical study. |
CTS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Machon B. Gregory, Angela S. Reninger |
Teaching SELinux in Introductory Information Assurance Classes. |
HICSS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Yuichi Nakamura 0005, Yoshiki Sameshima, Toshihiro Tabata |
SEEdit: SELinux Security Policy Configuration System with Higher Level Language. |
LISA |
2009 |
DBLP BibTeX RDF |
|
26 | Peter R. Croll, Matthew Henricksen, William J. Caelli, Vicky Liu |
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. |
MedInfo |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Bill MacCarty |
SELinux - NSA's open source security enhanced linux: beating the o-day vulnerability threat. |
|
2005 |
RDF |
|
26 | Trent Jaeger, Reiner Sailer, Xiaolan Zhang 0001 |
Analyzing Integrity Protection in the SELinux Example Policy. |
USENIX Security Symposium |
2003 |
DBLP BibTeX RDF |
|
26 | Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida |
Open-Source PKI on SELinux A Technology Description. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida |
Open-Source PKI on SELinux. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Asaf Shabtai |
Malware Detection on Mobile Devices. |
Mobile Data Management |
2010 |
DBLP DOI BibTeX RDF |
Security, Machine Learning, Mobile Devices, Malware, Android, SELinux |
22 | Hiroaki Inoue, Junji Sakai, Sunao Torii, Masato Edahiro |
FIDES: An advanced chip multiprocessor platform for secure next generation mobile terminals. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Secure mobile terminal, chip multiprocessor, SELinux |
22 | Berthold Agreiter |
Model-driven configuration of os-level mandatory access control: research abstract. |
ICSE Companion |
2008 |
DBLP DOI BibTeX RDF |
selinux, mac, model-driven security |
22 | Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren |
Security policy analysis using deductive spreadsheets. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
SELinux policy, security policy analysis, vulnerability analysis |
17 | Boniface Hicks, Sandra Julieta Rueda, Dave King 0002, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger |
An architecture for enforcing end-to-end access control over web applications. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
policy compliance, access control |
17 | Sandra Julieta Rueda, Yogesh Sreenivasan, Trent Jaeger |
Flexible security configuration for virtual machines. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
access control, virtual machines, policy, compliance |
17 | Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu |
Security Enforcement Model for Distributed Usage Control. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan |
Expanding Malware Defense by Securing Software Installations. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
Untrusted code, Software installation, Malicious code, Sandboxing |
17 | Hao Hu, Dengguo Feng |
BIFI: Architectural Support for Information Flow Integrity Measurement. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | William J. Caelli |
Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith |
Pastures: Towards Usable Security Policy Engineering. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Masoom Alam, Jean-Pierre Seifert, Xinwen Zhang |
A Model-Driven Framework for Trusted Computing Based Systems. |
EDOC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert |
NETRA: : seeing through access control. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
privilege escalation, vulnerability reports, static analysis |
17 | Trent Jaeger, Reiner Sailer, Umesh Shankar |
PRIMA: policy-reduced integrity measurement architecture. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
Clark-Wilson Lite integrity, information flow, remote attestation |
17 | Elizabeth I. Leonard, Myla Archer |
Extended abstract: organizing automaton specifications to achieve faithful representation. |
MEMOCODE |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Lawrence Teo, Gail-Joon Ahn |
Supporting access control policies across multiple operating systems. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
Chameleos, access control, operating systems, flexibility, extensibility, policy specification |
17 | Matthew Johnson 0003, Frank Stajano |
Implementing a Multi-hat PDA. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
17 | John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian |
Open-Source Applications of TCPA Hardware. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|