2011 5th International Conference on Network and System Security 2011
DOI: 10.1109/icnss.2011.6060002
|View full text |Cite
|
Sign up to set email alerts
|

Model-based safety analysis of SELinux security policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 22 publications
0
9
0
1
Order By: Relevance
“…As anticipated, most of the studies (51 out of 143) were focusing on the level of requirements. Fifteen studies 23–37 out of those 51 were focusing exclusively on requirements modeling of such systems. Thirty‐one studies 38–68 were focusing on both requirements modeling and analysis.…”
Section: Mapping Study Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As anticipated, most of the studies (51 out of 143) were focusing on the level of requirements. Fifteen studies 23–37 out of those 51 were focusing exclusively on requirements modeling of such systems. Thirty‐one studies 38–68 were focusing on both requirements modeling and analysis.…”
Section: Mapping Study Resultsmentioning
confidence: 99%
“…The proposed languages were either formal languages, 15,21,38,96,115 graphical modeling languages, 17,31,39,70 programming languages, 125 architecture description language, 106 or a language for presenting mishaps. 156 Some researchers also presented some decision support systems, 76,77,108,122,123 patterns, 50,85,100,105,119 and policies 29,54,80 for the MDE of safe and secure software systems.…”
Section: Contribution Classification (Rq3)mentioning
confidence: 99%
“…В статье [27] этот язык использован для построения алгоритмов и инструментов анализа политик. В работе [28] механизм SELinux вкладывается в известную модель безопасности Харрисона-Руззо-Ульмана (M.A. Harrison, W.L.…”
Section: обзор Selinuxunclassified
“…Guttman et al (Guttman et al, 2005) applies information flow analysis to SELinux policies. The HRU security model (Harrison et al, 1976) has been used to analyze SELinux policies (Amthor et al, 2011). Hurd et al (Hurd et al, 2009) applied Domain Specific Languages (DSL) (Fowler, 2010) in order to develop and verify the SELinux policy.…”
Section: Selinux Toolsmentioning
confidence: 99%