The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SELinux with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2006 (19) 2007-2008 (22) 2009-2010 (18) 2011-2017 (16) 2018-2023 (7)
Publication types (Num. hits)
article(14) book(1) inproceedings(67)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 82 occurrences of 52 keywords

Results
Found 82 publication records. Showing 82 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
127Yi-Ming Chen 0008, Yung-Wei Kao Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information flow, security policy, Colored Petri Nets, SELinux
119Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel A logical specification and analysis for SELinux MLS policy. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF policy compliance, SELinux, policy analysis, multi-level security
101Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang Design and implementation of a tool for analyzing SELinux secure policy. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security policy configuration, security policy description language, SELinux, integrity verification
92Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert A trusted mobile phone reference architecturevia secure kernel. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted mobile computing, security architecture, isolation, SELinux, secure kernel
87Gail-Joon Ahn, Dhruv Gami Enabling Role-Based Delegation and Revocation on Security-Enhanced Linux. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
84Björn Vogel, Bernd Steinke Using SELinux security enforcement in Linux-based embedded devices. Search on Bibsonomy MOBILWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, embedded system, SELinux
79Arpan Darivemula, Chokchai Leangsuksun, Anand Tikotekar, Makan Pourzandi Work in Progress: RASS Framework for a Cluster-Aware SELinux. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
79Giorgio Zanin, Luigi V. Mancini Towards a formal model for security policies specification and validation in the selinux system. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security enhanced linux, configuration, formal model
66Gail-Joon Ahn, Wenjuan Xu, Xinwen Zhang Systematic Policy Analysis for High-Assurance Services in SELinux. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SELinux, Policy Analysis
61Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli Enhanced Availability and Security by Rate Control Using Extended Policy Framework in SELinux. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
57Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger Measuring integrity on mobile phone systems. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile phones, SELinux, integrity measurement
52Takashi Horie, Toshiharu Harada, Kazuo Tanaka Adaptive Access Policy for the Linux Kernel. Search on Bibsonomy SAINT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Pedro Chávez Lugo, Juan Manuel Garcia Garcia, Juan J. Flores A System for Distributed SELinux Policy Management. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access, distributed, control, policies, administration, Kerberos, SELinux
49Masoom Alam, Jean-Pierre Seifert, Qi Li 0002, Xinwen Zhang Usage control platformization via trustworthy SELinux. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trusted computing, usage control, SELinux
49Pravin Shinde, Priyanka Sharma, Srinivas Guntupalli Automated Process Classi?cation Framework using SELinux Security Context. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF pcss, process classification using selinux security context, process classification framework, selniux
44Berthold Agreiter, Ruth Breu Model-Driven Configuration of SELinux Policies. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn Visualization based policy analysis: case study in SELinux. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono Simplifying security policy descriptions for internet servers in secure operating systems. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF policy description, SELinux, internet server, secure operating system
40Vikhyath Rao, Trent Jaeger Dynamic mandatory access control for multiple stakeholders. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile phones, selinux, distributed access control
40Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger Analysis of virtual machine system policies. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF xen security modules (xsm), virtual machines, selinux, policy analysis
40SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han Design and Implementation of Fast Access Control That Supports the Separation of Duty. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Flask, Access control, RBAC, SELinux, DAC
40Vinod Ganapathy, Trent Jaeger, Somesh Jha Automatic placement of authorization hooks in the linux security modules framework. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF LSM, hook placement, static analysis, SELinux
35Jérémy Briffaut, Jean-François Lalande, Waleed W. Smari Team--Based MAC Policy over Security--Enhanced Linux. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Hiroaki Inoue, Akihisa Ikeno, Masaki Kondo, Junji Sakai, Masato Edahiro FIDES: an advanced chip multiprocessor platform for secure next generation mobile terminals. Search on Bibsonomy CODES+ISSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF secure mobile terminal, chip multiprocessor, linux
35Trent Jaeger, Reiner Sailer, Xiaolan Zhang 0001 Resolving constraint conflicts. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF access control models, constraint models, policy design
35Trent Jaeger, Xiaolan Zhang 0001, Antony Edwards Policy management using access control spaces. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authorization mechanisms, role-based access control, Access control models
26Divyam Pahuja, Alvin Tang, Klim Tsoutsman Automated SELinux RBAC Policy Verification Using SMT. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin IFCIL: An Information Flow Configuration Language for SELinux (Extended Version). Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin IFCIL: An Information Flow Configuration Language for SELinux. Search on Bibsonomy CSF The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Yan Ding, Pan Dong, Zhipeng Li, Yusong Tan, Chenlin Huang, Lifeng Wei, Yudan Zuo SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar, Parjanya Vyas Consistency analysis and flow secure enforcement of SELinux policies. Search on Bibsonomy Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Jae-Yong Ko, Sang-Gil Lee, Cheol-Hoon Lee Real-time Mandatory Access Control on SELinux for Internet of Things. Search on Bibsonomy ICCE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies. Search on Bibsonomy DBSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Xin-long Song, Chung-Huang Yang Mobile Device Management System Based on AOSP and SELinux. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Amir Eaman, Bahman Sistany, Amy P. Felty Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution. Search on Bibsonomy MCETECH The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Robert Gove V3SPA: A visual analysis, exploration, and diffing tool for SELinux and SEAndroid security policies. Search on Bibsonomy VizSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Yuichi Nakamura 0005, Yoshiki Sameshima, Toshihiro Yamauchi Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems. Search on Bibsonomy J. Inf. Process. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Simone Mutti, Enrico Bacis, Stefano Paraboschi An SELinux-based intent manager for Android. Search on Bibsonomy CNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Peter Amthor 0001 A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Gaoshou Zhai, Tao Guo, Jie Huang SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs. Search on Bibsonomy INTRUST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Michele Paolino, Mian Muhammad Hamayun, Daniel Raho A Performance Analysis of ARM Virtual Machines Secured Using SELinux. Search on Bibsonomy CSP Forum The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn Visualization-based policy analysis for SELinux: framework and user study. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Ananya Chatterjee, Arun Mishra Securing the Root Through SELinux. Search on Bibsonomy ICACNI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Z. Cliffe Schreuders, Tanya Jane McGill, Christian Payne Towards Usable Application-Oriented Access Controls: Qualitative Results from a Usability Study of SELinux, AppArmor and FBAC-LSM. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Patrice Clemente, Bangaly Kaba, Jonathan Rouzaud-Cornabas, Marc Alexandre, Guillaume Aujay SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack Logs. Search on Bibsonomy AMT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Z. Cliffe Schreuders, Tanya Jane McGill, Christian Payne Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Salem Benferhat, Khalid Bouriche, Mohamed Ouzarf Encoding default-based SELinux-security policy in Organization-Based Access Control Model. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
26Said Marouf, Mohamed Shehab SEGrapher: Visualization-based SELinux Policy Analysis. Search on Bibsonomy SafeConfig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Peter Amthor 0001, Winfried E. Kühnhauser, Anja Pölck Model-based safety analysis of SELinux security policies. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel A logical specification and analysis for SELinux MLS policy. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Yuichi Nakamura 0005, Yoshiki Sameshima, Toshihiro Yamauchi SELinux Security Policy Configuration System with Higher Level Language. Search on Bibsonomy J. Inf. Process. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Asaf Shabtai, Yuval Fledel, Yuval Elovici Securing Android-Powered Mobile Devices Using SELinux. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Linda Markowsky An SELinux Sourcebook for Cybersecurity Educators. Search on Bibsonomy Security and Management The full citation details ... 2010 DBLP  BibTeX  RDF
26Jaroslav Janácek Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism. Search on Bibsonomy NDT (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Said Marouf, Doan Minh Phuong, Mohamed Shehab A learning-based approach for SELinux policy optimization with type mining. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Mathieu Blanc, Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard Classification of Malicious Distributed SELinux Activities. Search on Bibsonomy J. Comput. The full citation details ... 2009 DBLP  BibTeX  RDF
26Mathieu Blanc, Patrice Clemente, Steve-William Kissi Toward a real MLS/SELinux system for end users: An empirical study. Search on Bibsonomy CTS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Machon B. Gregory, Angela S. Reninger Teaching SELinux in Introductory Information Assurance Classes. Search on Bibsonomy HICSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Yuichi Nakamura 0005, Yoshiki Sameshima, Toshihiro Tabata SEEdit: SELinux Security Policy Configuration System with Higher Level Language. Search on Bibsonomy LISA The full citation details ... 2009 DBLP  BibTeX  RDF
26Peter R. Croll, Matthew Henricksen, William J. Caelli, Vicky Liu Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records. Search on Bibsonomy MedInfo The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Bill MacCarty SELinux - NSA's open source security enhanced linux: beating the o-day vulnerability threat. Search on Bibsonomy 2005   RDF
26Trent Jaeger, Reiner Sailer, Xiaolan Zhang 0001 Analyzing Integrity Protection in the SELinux Example Policy. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2003 DBLP  BibTeX  RDF
26Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida Open-Source PKI on SELinux A Technology Description. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Edward Bubnis, Shelby Evans, Peter Fischer, Elizabeth Meighan, Aswin Almeida Open-Source PKI on SELinux. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Asaf Shabtai Malware Detection on Mobile Devices. Search on Bibsonomy Mobile Data Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Security, Machine Learning, Mobile Devices, Malware, Android, SELinux
22Hiroaki Inoue, Junji Sakai, Sunao Torii, Masato Edahiro FIDES: An advanced chip multiprocessor platform for secure next generation mobile terminals. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure mobile terminal, chip multiprocessor, SELinux
22Berthold Agreiter Model-driven configuration of os-level mandatory access control: research abstract. Search on Bibsonomy ICSE Companion The full citation details ... 2008 DBLP  DOI  BibTeX  RDF selinux, mac, model-driven security
22Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren Security policy analysis using deductive spreadsheets. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SELinux policy, security policy analysis, vulnerability analysis
17Boniface Hicks, Sandra Julieta Rueda, Dave King 0002, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger An architecture for enforcing end-to-end access control over web applications. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF policy compliance, access control
17Sandra Julieta Rueda, Yogesh Sreenivasan, Trent Jaeger Flexible security configuration for virtual machines. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, virtual machines, policy, compliance
17Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu Security Enforcement Model for Distributed Usage Control. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan Expanding Malware Defense by Securing Software Installations. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Untrusted code, Software installation, Malicious code, Sandboxing
17Hao Hu, Dengguo Feng BIFI: Architectural Support for Information Flow Integrity Measurement. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17William J. Caelli Modernising MAC: New Forms for Mandatory Access Control in an Era of DRM. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith Pastures: Towards Usable Security Policy Engineering. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Masoom Alam, Jean-Pierre Seifert, Xinwen Zhang A Model-Driven Framework for Trusted Computing Based Systems. Search on Bibsonomy EDOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert NETRA: : seeing through access control. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privilege escalation, vulnerability reports, static analysis
17Trent Jaeger, Reiner Sailer, Umesh Shankar PRIMA: policy-reduced integrity measurement architecture. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clark-Wilson Lite integrity, information flow, remote attestation
17Elizabeth I. Leonard, Myla Archer Extended abstract: organizing automaton specifications to achieve faithful representation. Search on Bibsonomy MEMOCODE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Lawrence Teo, Gail-Joon Ahn Supporting access control policies across multiple operating systems. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Chameleos, access control, operating systems, flexibility, extensibility, policy specification
17Matthew Johnson 0003, Frank Stajano Implementing a Multi-hat PDA. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian Open-Source Applications of TCPA Hardware. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #82 of 82 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license