A Trusted Path design and implementation for Security Enhanced Linux
Download
Author
Hilchie, Allan T.
Date
2004-09Advisor
Irvine, Cynthia E.
Shifflett, David
Metadata
Show full item recordAbstract
The threat posed by malicious software and networked adversaries to computers has resulted in the development of mechanisms to provide assurance that security sensitive information is not being compromised. One such mechanism is called a Trusted Path. A Trusted Path provides a protected communications channel that permits the computer to authenticate itself to the user and for the user to authenticate to the system. This thesis provides a demonstration implementation of a Trusted Path for Security Enhanced Linux (SELinux) and is used to examine trusted paths, their design and implementation. Additionally, the effectiveness of a Trusted Path for SELinux is analyzed. This research is meant to provide a framework that could be used in combination with other efforts to enhance the security of SELinux.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Supporting a Trusted Path for the LINUX operating system
Bartram, Scott A. (Monterey, California. Naval Postgraduate School, 2000-06);The existence of Trojan horses, viruses, and other malicious software has motivated the computer security industry to invent mechanisms that protect against malicious software. One such mechanism is called the Trusted Path. ... -
A Security Domain Model to Assess Software for Exploitable Covert Channels
Auguston, Mikhail; Levin, Timothy; Shaffer, Alan; Irvine, Cynthia E. (Association for Computing Machinery (ACM), 2005-06-30);Within a multilevel secure (MLS) system, trusted subjects are granted privileges to perform operations that are not possible by ordinary subjects controlled by mandatory access control (MAC) policy enforcement mechanisms. ... -
A security domain model for implementing trusted subject behaviors
Shaffer, Alan B.; Irvine, Cynthia E.; Levin, Timothy E.; Auguston, Mikhail (Monterey, California. Naval Postgraduate School, 2008-09-19); NPS-CS-08-015Within a multilevel secure (MLS) system, trusted subjects are granted privileges to perform operations that are not possible by ordinary subjects controlled by mandatory access control (MAC) policy enforcement mechanisms. ...