A Trusted Path design and implementation for Security Enhanced Linux
Loading...
Authors
Hilchie, Allan T.
Subjects
Linux
security enhanced Linux
trusted path
secure attention key
computer security;
security enhanced Linux
trusted path
secure attention key
computer security;
Advisors
Irvine, Cynthia E.
Shifflett, David
Date of Issue
2004-09
Date
September 2004
Publisher
Monterey, California. Naval Postgraduate School
Language
Abstract
The threat posed by malicious software and networked adversaries to computers has resulted in the development of mechanisms to provide assurance that security sensitive information is not being compromised. One such mechanism is called a Trusted Path. A Trusted Path provides a protected communications channel that permits the computer to authenticate itself to the user and for the user to authenticate to the system. This thesis provides a demonstration implementation of a Trusted Path for Security Enhanced Linux (SELinux) and is used to examine trusted paths, their design and implementation. Additionally, the effectiveness of a Trusted Path for SELinux is analyzed. This research is meant to provide a framework that could be used in combination with other efforts to enhance the security of SELinux.
Type
Description
Series/Report No
Department
Computer Science.
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
xiv, 125 p. ; 28 cm.
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.