<--- Back to Details
First PageDocument Content
System software / Computer architecture / Linux kernel / Access control / AppArmor / Mandatory access control / Linux Security Modules / Smack / LXC / Linux namespaces / Cgroups / Linux containers
Date: 2018-01-21 22:58:22
System software
Computer architecture
Linux kernel
Access control
AppArmor
Mandatory access control
Linux Security Modules
Smack
LXC
Linux namespaces
Cgroups
Linux containers

Namespacing in SELinux Linux.conf.au 2018 Sydney, Australia James Morris

Add to Reading List

Source URL: namei.org

Download Document from Source Website

File Size: 211,40 KB

Share Document on Facebook

Similar Documents

Poster: Full Support for Reference Monitoring in Android’s Application Framework Michael Backes Sven Bugiel

Poster: Full Support for Reference Monitoring in Android’s Application Framework Michael Backes Sven Bugiel

DocID: 1fvCs - View Document

Linux Security Modules: General Security Hooks for Linux Stephen Smalley NAI Labs

Linux Security Modules: General Security Hooks for Linux Stephen Smalley NAI Labs

DocID: 1f7jD - View Document

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

DocID: 1904I - View Document

Linux Plumbers Conference / LinuxCon EuropeHow to design a Linux kernel interface Michael Kerrisk man7.org Training and Consulting

Linux Plumbers Conference / LinuxCon EuropeHow to design a Linux kernel interface Michael Kerrisk man7.org Training and Consulting

DocID: 18P5N - View Document

Pastures: Towards Usable Security Policy Engineering Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith Dartmouth College Abstract  will later review several such approaches that enjoy de facto

Pastures: Towards Usable Security Policy Engineering Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith Dartmouth College Abstract will later review several such approaches that enjoy de facto

DocID: 18NsH - View Document