Abstract
The secure OS means the system that defends and blocks the prospective hacking by adding various security functions such as access control, user authentication, audit and trail, and anti-hacking to Linux kernel. To protect important information from threatening elements, it is essential to establish the security system that satisfies the systematic security policy and the security requirements. In this paper, we analyzed the existing studies about the current secure OS, security module and SELinux, and suggested Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. In addition, by restricting the root authority, the access to security level files without any access authority will be blocked. Malicious hacking can be thoroughly blocked thanks to real-time audit trailing using DB.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Pfleeger, C.P.: Security in Computing. PTR (1997)
Gollmann, D.: Computer Security. John Wiley & SONS, West Sussex (1999)
Wlash, D.: Elevating Security Best Practices: SELinux (November 2003)
Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the Linux operating system. In: Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference (2001)
IEEE Std 1003.2c-Draft standard for Information Technology Portable Operating System Interface(POSIX) Part 2: Shell and Utilities : Protection and Control Interfaces.
Smalley, S.: Configuring the SELinux policy. NAI Labs Report #02-007, www.nsa.gov/selinux (June 2002)
Smalley, S., Fraser, T.: A Security Policy Configuration for the Security-Enhanced Linux. NAI Labs Technical Report (February 2001)
Jaeger, T., Edwards, A., Zhang, X.: Managing access control policies using access control spaces. In: Proceedings of the ACM Symposium on Access Control Models and Technologies (June 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, J., Kim, S. (2011). A Study on the Access Control Module of Linux Secure Operating System. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Advanced Communication and Networking. ACN 2011. Communications in Computer and Information Science, vol 199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23312-8_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-23312-8_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23311-1
Online ISBN: 978-3-642-23312-8
eBook Packages: Computer ScienceComputer Science (R0)