Mandatory Access Control Policies Based on Vague Requirements
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61988987%3A17310%2F14%3AA1501BUN" target="_blank" >RIV/61988987:17310/14:A1501BUN - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Mandatory Access Control Policies Based on Vague Requirements
Popis výsledku v původním jazyce
This article focuses on mandatory access control and security policies within an operating system. The proposed methodology for the selection and deployment of policies based on vague descriptions is extended by generating customized policies and supported by an expert system, as a tool, that offers to minimize, or even completely eliminate, the need for a security consultant as an expert in the problem domain, for designing and selecting policies to harden the operating system and furthermore to designa secure operating system. This methodology moves this key responsibility to either the user or the system administrator. In this article, the methodology is used to generate components of operating system and with conjunction with SELinux reference policy to generate the customized policies, also called custom policies, which will allow setting the security level of certain applications vaguely.
Název v anglickém jazyce
Mandatory Access Control Policies Based on Vague Requirements
Popis výsledku anglicky
This article focuses on mandatory access control and security policies within an operating system. The proposed methodology for the selection and deployment of policies based on vague descriptions is extended by generating customized policies and supported by an expert system, as a tool, that offers to minimize, or even completely eliminate, the need for a security consultant as an expert in the problem domain, for designing and selecting policies to harden the operating system and furthermore to designa secure operating system. This methodology moves this key responsibility to either the user or the system administrator. In this article, the methodology is used to generate components of operating system and with conjunction with SELinux reference policy to generate the customized policies, also called custom policies, which will allow setting the security level of certain applications vaguely.
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2014
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
International Journal of Intelligent Computing Research (IJICR)
ISSN
2042-4655
e-ISSN
—
Svazek periodika
5
Číslo periodika v rámci svazku
1/2
Stát vydavatele periodika
GB - Spojené království Velké Británie a Severního Irska
Počet stran výsledku
9
Strana od-do
396-404
Kód UT WoS článku
—
EID výsledku v databázi Scopus
—