Download now Free registration required
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals - security in practice requires effective policy engineering. The authors have found that the reigning SELinux model fares poorly in this regard, partly because typical isolation goals are not directly stated but instead are properties derivable from the type definitions by complicated analysis tools. Instead, they are experimenting with a security-policy approach based on copy-on-write "Pastures", in which the sharing of resources between pastures is the fundamental security policy primitive.
- Format: PDF
- Size: 107.8 KB