Translating Security Policy to Executable Code for Sandboxing Linux Kernel.
Hrushikesha MohantyMartha VenkataSwamySrini RamaswamyR. K. ShyamasundarPublished in: EMS (2009)
Keyphrases
- linux kernel
- security policies
- source code
- clone detection
- operating system
- access control
- software systems
- distributed systems
- network security
- security concerns
- security management
- network management
- open source
- analysis tool
- security requirements
- software evolution
- access control policies
- access control systems
- event logs
- file system
- real world
- ubiquitous computing environments
- software engineering
- privacy preserving
- information security
- object oriented
- software architecture
- unauthorized access
- machine learning