2010 Fourth International Conference on Emerging Security Information, Systems and Technologies 2010
DOI: 10.1109/securware.2010.51
|View full text |Cite
|
Sign up to set email alerts
|

Protection of a Shared HPC Cluster

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…We published separately results regarding the PIGA performance [4]. In particular, this article presented the results for an offline analysis of a SELinux policy with PIGA.…”
Section: A Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…We published separately results regarding the PIGA performance [4]. In particular, this article presented the results for an offline analysis of a SELinux policy with PIGA.…”
Section: A Resultsmentioning
confidence: 99%
“…As presented in PIGA-HIPS [4], we choose to use two separate reference monitors to enforce access control in our shared cluster environment. The first level is SELinux, it is essential because it can block direct information flows at a lower performance cost than the second level.…”
Section: Approaches and Methodology A Two Levels Of Access Controlmentioning
confidence: 99%
See 3 more Smart Citations