Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON

Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different...

Full description

Saved in:
Bibliographic Details
Published inSecurity Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 57 - 67
Main Authors Yamamoto, Kenji, Yamauchi, Toshihiro
Format Book Chapter
LanguageEnglish
Published Germany Springer Berlin / Heidelberg 2010
Springer Berlin Heidelberg
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN3642176097
9783642176098
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-17610-4_7

Cover

Abstract Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the performance of the secure OS in detail, and the relationship between the implementation method and the performance is not clear. The secure OS in Linux after version 2.6 has often been implemented by Linux Security Modules (LSM). Therefore, we determine the effect of introducing the secure OS on the performance of the OS, and a characteristic by the difference of the implementation method by using the overhead measurement tool, the LSM Performance Monitor (LSMPMON); the LSMPMON can be used to evaluate three different secure OSes.
AbstractList Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the performance of the secure OS in detail, and the relationship between the implementation method and the performance is not clear. The secure OS in Linux after version 2.6 has often been implemented by Linux Security Modules (LSM). Therefore, we determine the effect of introducing the secure OS on the performance of the OS, and a characteristic by the difference of the implementation method by using the overhead measurement tool, the LSM Performance Monitor (LSMPMON); the LSMPMON can be used to evaluate three different secure OSes.
Author Yamauchi, Toshihiro
Yamamoto, Kenji
Author_xml – sequence: 1
  givenname: Kenji
  surname: Yamamoto
  fullname: Yamamoto, Kenji
  email: yamamoto-k@swlab.cs.okayama-u.ac.jp
  organization: Graduate School of Natural Science and Technology, Okayama University, Okayama, Japan
– sequence: 2
  givenname: Toshihiro
  surname: Yamauchi
  fullname: Yamauchi, Toshihiro
  email: yamauchi@cs.okayama-u.ac.jp
  organization: Graduate School of Natural Science and Technology, Okayama University, Okayama, Japan
BookMark eNpVkN1OwjAYhquiEZAr8GQ3UG3X_0Ml-JOAkCDHTdd2isI22-H12wEx2pO275vnS_sMQK-qKw_ANUY3GCFxq4SEBHKaQyw4RpBqcQJGKSUp20f0FPSx5AwiRcQZGBwLpETvt8jVBejz1AslpboEoxg_UFqUcsFFHxSTb7PZmXZdV1ldZgsfyjpsTWV9d116uws-my-zVVxXb__qP-DM23dTreO2Y6bLGbw30bvutJjNX67AeWk20Y-O-xCsHiav4yc4nT8-j--msMGMCWi5dLkXDAkuixJZx11OOfc4N9YyzJXNhRIlUdRJxyhmBXHWkwI7SQqTtAwBPsyNTUiP9UEXdf0ZNUa6E6qTOk10cqT39nQSmpj8wDSh_tr52GrfQdZXbTCb9Kum9SFqgjjHAmvONBfkBwQBdKY
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2010
DBID FFUUA
DOI 10.1007/978-3-642-17610-4_7
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783642176104
3642176100
EISSN 1865-0937
Editor Fang, Wai-Chi
Kang, Heau-jo
Arnett, Kirk P
Khurram Khan, Muhammad
Ślęzak, Dominik
Editor_xml – sequence: 1
  fullname: Fang, Wai-Chi
– sequence: 2
  fullname: Ślęzak, Dominik
– sequence: 3
  fullname: Kang, Heau-jo
– sequence: 4
  fullname: Arnett, Kirk P
– sequence: 5
  fullname: Khurram Khan, Muhammad
EndPage 67
ExternalDocumentID EBC3066171_65_67
GroupedDBID -T.
089
0D6
0DA
20A
38.
4UP
4V3
9-X
A4J
AABBV
ABBVZ
ABMKK
ABMNI
ACDPG
ACZTO
ADVHH
AEJLV
AEKFX
AEOKE
AETDV
AEZAY
AHSMR
ALMA_UNASSIGNED_HOLDINGS
AZZ
BBABE
CZZ
FFUUA
I4C
IEZ
JJU
MA.
MYL
SBO
SNUHX
TBMHI
TPJZQ
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
29F
RSU
ID FETCH-LOGICAL-p1557-c68d2e750768bf0cd6d2466e12acc5169c2797f394d8d5415b3dce3b1d83ba783
ISBN 3642176097
9783642176098
ISSN 1865-0929
IngestDate Tue Jul 29 19:59:24 EDT 2025
Wed May 28 23:38:58 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum QA75.5-76.95
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p1557-c68d2e750768bf0cd6d2466e12acc5169c2797f394d8d5415b3dce3b1d83ba783
OCLC 693779889
PQID EBC3066171_65_67
PageCount 11
ParticipantIDs springer_books_10_1007_978_3_642_17610_4_7
proquest_ebookcentralchapters_3066171_65_67
PublicationCentury 2000
PublicationDate 2010
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace Germany
PublicationPlace_xml – name: Germany
– name: Berlin, Heidelberg
PublicationSeriesTitle Communications in Computer and Information Science
PublicationSubtitle International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
PublicationTitle Security Technology, Disaster Recovery and Business Continuity
PublicationYear 2010
Publisher Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
SSID ssj0000446767
ssj0000580895
ssib054953581
Score 1.3559704
Snippet Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due...
SourceID springer
proquest
SourceType Publisher
StartPage 57
SubjectTerms Linux
LSM
Performance Evaluation
Secure OS
Title Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066171&ppg=67
http://link.springer.com/10.1007/978-3-642-17610-4_7
Volume 122
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKWYCBt3grAxNVUPOonW5AVVQhCkgFxGbFj0pdCqJlgF_Pne24bmGBJUqdOrH8Wfb57r7PhJzqVEkJQyGmJcvjvExpXIgiiYVUzUQn5VA3kSjcv6O9p_zmpfVSq12E7JKpOJdfv_JK_oMqlAGuyJL9A7L-pVAA94AvXAFhuC4Yv_NuVsvhcCfPBd5xM4GMJiWKH6BBiOmZVl_J57ejGtVo_DGafoaDpes1v01OXEAmQE4Lfkg37gcNm18QPg4q9jWSiPHMDQw7DPrxFSyQCu8e-s4L5rwLJkkt9C5U3sWGE99CKfXfBLgMGSSH7Q1t2kOl_eRqWcc_JuowNwMqok4lfDznbLYuVbF4ulBmFt_uVQc2O2B-JZy2OGVLZIkVeZ0sX3Zvbp-9lw3D1YziwYy-eczKLs2a67WorNzwQnvmdh4LwXJjgzxukDXkpURIGIEmbpKaHm-R9epUjshN0ltkNZCY3CZihlD0OowC7PCnhTa6H0QG2rnHQUUPLdbx0EYO2h3ydN197PRid65G_AbWI4slLVSqwVSEraYYNqWiKs0p1UlaSolxU5myNhtm7VwVqgUWnsiU1JlIVJGJErpul9THr2O9RyKZtLWEPYZEHUWq24VCE1mWKAKllc72SaPqPW6i_y7lWNq-mvA5EPfJWdXBHP884ZWoNgDDMw7AcAMMB2AO_vTqQ7IyG95HpD59_9DHYE5OxYkbM99b0HHx
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+Technology%2C+Disaster+Recovery+and+Business+Continuity&rft.atitle=Evaluation+of+Performance+of+Secure+OS+Using+Performance+Evaluation+Mechanism+of+LSM-Based+LSMPMON&rft.date=2010-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642176098&rft.volume=122&rft_id=info:doi/10.1007%2F978-3-642-17610-4_7&rft.externalDBID=67&rft.externalDocID=EBC3066171_65_67
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066171-l.jpg