Skip to main content

A Study on the Access Control Module of Linux Secure Operating System

  • Conference paper
  • 1164 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 199))

Abstract

The secure OS means the system that defends and blocks the prospective hacking by adding various security functions such as access control, user authentication, audit and trail, and anti-hacking to Linux kernel. To protect important information from threatening elements, it is essential to establish the security system that satisfies the systematic security policy and the security requirements. In this paper, we analyzed the existing studies about the current secure OS, security module and SELinux, and suggested Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. In addition, by restricting the root authority, the access to security level files without any access authority will be blocked. Malicious hacking can be thoroughly blocked thanks to real-time audit trailing using DB.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pfleeger, C.P.: Security in Computing. PTR (1997)

    Google Scholar 

  2. Gollmann, D.: Computer Security. John Wiley & SONS, West Sussex (1999)

    Google Scholar 

  3. Wlash, D.: Elevating Security Best Practices: SELinux (November 2003)

    Google Scholar 

  4. Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the Linux operating system. In: Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference (2001)

    Google Scholar 

  5. IEEE Std 1003.2c-Draft standard for Information Technology Portable Operating System Interface(POSIX) Part 2: Shell and Utilities : Protection and Control Interfaces.

    Google Scholar 

  6. Smalley, S.: Configuring the SELinux policy. NAI Labs Report #02-007, www.nsa.gov/selinux (June 2002)

  7. Smalley, S., Fraser, T.: A Security Policy Configuration for the Security-Enhanced Linux. NAI Labs Technical Report (February 2001)

    Google Scholar 

  8. Jaeger, T., Edwards, A., Zhang, X.: Managing access control policies using access control spaces. In: Proceedings of the ACM Symposium on Access Control Models and Technologies (June 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, J., Kim, S. (2011). A Study on the Access Control Module of Linux Secure Operating System. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Advanced Communication and Networking. ACN 2011. Communications in Computer and Information Science, vol 199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23312-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23312-8_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23311-1

  • Online ISBN: 978-3-642-23312-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics