Analyzing the Overhead of Filesystem Protection Using Linux Security Modules.
Wenhui ZhangTrent JaegerPeng LiuPublished in: CoRR (2021)
Keyphrases
- operating system
- information security
- previously mentioned
- security level
- protection scheme
- security mechanisms
- security architecture
- critical infrastructure
- biometric template
- data protection
- open source
- access control
- security issues
- network security
- protection mechanisms
- security policies
- virtual machine
- anti virus
- computer systems
- intrusion detection
- database applications
- security patterns
- individual privacy
- command line
- security systems
- file system
- windows nt
- data confidentiality
- data security
- cyber security
- security requirements
- privacy protection
- linux kernel
- security protocols