Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Empowering end users to confine their own applications: the results of a usability study comparing SELinux, AppArmor, and FBAC-LSM
Schreuders Z., McGill T., Payne C. ACM Transactions on Information and System Security14 (2):1-28,2011.Type:Article
Date Reviewed: Nov 29 2011

Application security is at the core of current computing usage. This paper describes a Linux-based software product that may help organizations confine applications without consuming excessive support resources. It is for people with responsibilities in information technology (IT) security in a Unix environment.

At 28 pages, the paper is long enough to adequately cover the material. As is expected from a respected ACM publication, the paper is clearly written. Because the study methods are fully described and the software products involved are freely available, the study could readily be reproduced.

The paper describes the background, method, and results of a usability study that compared functionality-based application confinement-Linux security module (FBAC-LSM), a free, open-source software product written by the authors, with alternative methods (SELinux and AppArmor) that are available with various Unix distributions. Users were given detailed instructions on the security objectives to be achieved, as well as the opportunity to use one of the three products to achieve the required objectives. Unsurprisingly, the users achieved much better outcomes, and gave better subjective assessments, using FBAC-LSM.

In summary, this paper is recommended reading for information security professionals in private or public organizations where Linux is the platform of choice.

Reviewer:  Neil D. Burgess Review #: CR139613 (1204-0386)
Bookmark and Share
  Featured Reviewer  
 
Access Controls (D.4.6 ... )
 
 
Linux (D.4.0 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Access Controls": Date
Access control lists in capability environments
Lopriore L. Technology and Science of Informatics 3(3): 163-174, 1984. Type: Article
Mar 1 1985
Some variants of the take-grant protection model
Biskup J. (ed) Information Processing Letters 19(3): 151-156, 1984. Type: Article
Jun 1 1985
On access checking in capability-based systems
Kain R., Landwehr C. (ed) IEEE Transactions on Software Engineering SE-13(2): 202-207, 1987. Type: Article
Dec 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy