Comparative Study of Containment Strategies in Solaris and Security Enhanced Linux

To minimize the damage in the event of a security breach it is desirable to limit the privileges of remotely available services to the bare minimum and to isolate the individual services from the rest of the operating system. To achieve this there is a number of different containment strategies and...

Full description

Bibliographic Details
Main Authors: Eriksson, Magnus, Palmroos, Staffan
Format: Others
Language:English
Published: Linköpings universitet, Institutionen för datavetenskap 2007
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9078