Back to Search Start Over

Verifying information flow goals in Security‐Enhanced Linux.

Authors :
Guttman, Joshua D.
Herzog, Amy L.
Ramsdell, John D.
Skorupka, Clement W.
Source :
Journal of Computer Security. 2005, Vol. 13 Issue 1, p115-134. 20p. 1 Diagram, 2 Charts.
Publication Year :
2005

Abstract

In this paper, we present a systematic way to determine the information flow security goals achieved by systems running a secure O/S, specifically systems running Security‐Enhanced Linux. A formalization of the access control mechanism of the SELinux security server, together with a labeled transition system representing an SELinux configuration, provides our framework. Information flow security goal statements expressed in linear temporal logic provide a clear description of the objectives that SELinux is intended to achieve. We use model checking to determine whether security goals hold in a given system. These formal models combined with appropriate algorithms have led to automated tools for the verification of security properties in an SELinux system. Our approach has been used in other security management contexts over the past decade, under the name rigorous automated security management. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
0926227X
Volume :
13
Issue :
1
Database :
Academic Search Index
Journal :
Journal of Computer Security
Publication Type :
Academic Journal
Accession number :
15569435
Full Text :
https://doi.org/10.3233/JCS-2005-13105