Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON
Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different...
Saved in:
Published in | Security Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 57 - 67 |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Berlin / Heidelberg
2010
Springer Berlin Heidelberg |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 1865-0937 |
DOI | 10.1007/978-3-642-17610-4_7 |
Cover
Abstract | Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the performance of the secure OS in detail, and the relationship between the implementation method and the performance is not clear. The secure OS in Linux after version 2.6 has often been implemented by Linux Security Modules (LSM). Therefore, we determine the effect of introducing the secure OS on the performance of the OS, and a characteristic by the difference of the implementation method by using the overhead measurement tool, the LSM Performance Monitor (LSMPMON); the LSMPMON can be used to evaluate three different secure OSes. |
---|---|
AbstractList | Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the performance of the secure OS in detail, and the relationship between the implementation method and the performance is not clear. The secure OS in Linux after version 2.6 has often been implemented by Linux Security Modules (LSM). Therefore, we determine the effect of introducing the secure OS on the performance of the OS, and a characteristic by the difference of the implementation method by using the overhead measurement tool, the LSM Performance Monitor (LSMPMON); the LSMPMON can be used to evaluate three different secure OSes. |
Author | Yamauchi, Toshihiro Yamamoto, Kenji |
Author_xml | – sequence: 1 givenname: Kenji surname: Yamamoto fullname: Yamamoto, Kenji email: yamamoto-k@swlab.cs.okayama-u.ac.jp organization: Graduate School of Natural Science and Technology, Okayama University, Okayama, Japan – sequence: 2 givenname: Toshihiro surname: Yamauchi fullname: Yamauchi, Toshihiro email: yamauchi@cs.okayama-u.ac.jp organization: Graduate School of Natural Science and Technology, Okayama University, Okayama, Japan |
BookMark | eNpVkN1OwjAYhquiEZAr8GQ3UG3X_0Ml-JOAkCDHTdd2isI22-H12wEx2pO275vnS_sMQK-qKw_ANUY3GCFxq4SEBHKaQyw4RpBqcQJGKSUp20f0FPSx5AwiRcQZGBwLpETvt8jVBejz1AslpboEoxg_UFqUcsFFHxSTb7PZmXZdV1ldZgsfyjpsTWV9d116uws-my-zVVxXb__qP-DM23dTreO2Y6bLGbw30bvutJjNX67AeWk20Y-O-xCsHiav4yc4nT8-j--msMGMCWi5dLkXDAkuixJZx11OOfc4N9YyzJXNhRIlUdRJxyhmBXHWkwI7SQqTtAwBPsyNTUiP9UEXdf0ZNUa6E6qTOk10cqT39nQSmpj8wDSh_tr52GrfQdZXbTCb9Kum9SFqgjjHAmvONBfkBwQBdKY |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2010 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 |
DBID | FFUUA |
DOI | 10.1007/978-3-642-17610-4_7 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783642176104 3642176100 |
EISSN | 1865-0937 |
Editor | Fang, Wai-Chi Kang, Heau-jo Arnett, Kirk P Khurram Khan, Muhammad Ślęzak, Dominik |
Editor_xml | – sequence: 1 fullname: Fang, Wai-Chi – sequence: 2 fullname: Ślęzak, Dominik – sequence: 3 fullname: Kang, Heau-jo – sequence: 4 fullname: Arnett, Kirk P – sequence: 5 fullname: Khurram Khan, Muhammad |
EndPage | 67 |
ExternalDocumentID | EBC3066171_65_67 |
GroupedDBID | -T. 089 0D6 0DA 20A 38. 4UP 4V3 9-X A4J AABBV ABBVZ ABMKK ABMNI ACDPG ACZTO ADVHH AEJLV AEKFX AEOKE AETDV AEZAY AHSMR ALMA_UNASSIGNED_HOLDINGS AZZ BBABE CZZ FFUUA I4C IEZ JJU MA. MYL SBO SNUHX TBMHI TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 29F RSU |
ID | FETCH-LOGICAL-p1557-c68d2e750768bf0cd6d2466e12acc5169c2797f394d8d5415b3dce3b1d83ba783 |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 |
IngestDate | Tue Jul 29 19:59:24 EDT 2025 Wed May 28 23:38:58 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum | QA75.5-76.95 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1557-c68d2e750768bf0cd6d2466e12acc5169c2797f394d8d5415b3dce3b1d83ba783 |
OCLC | 693779889 |
PQID | EBC3066171_65_67 |
PageCount | 11 |
ParticipantIDs | springer_books_10_1007_978_3_642_17610_4_7 proquest_ebookcentralchapters_3066171_65_67 |
PublicationCentury | 2000 |
PublicationDate | 2010 |
PublicationDateYYYYMMDD | 2010-01-01 |
PublicationDate_xml | – year: 2010 text: 2010 |
PublicationDecade | 2010 |
PublicationPlace | Germany |
PublicationPlace_xml | – name: Germany – name: Berlin, Heidelberg |
PublicationSeriesTitle | Communications in Computer and Information Science |
PublicationSubtitle | International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings |
PublicationTitle | Security Technology, Disaster Recovery and Business Continuity |
PublicationYear | 2010 |
Publisher | Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
SSID | ssj0000446767 ssj0000580895 ssib054953581 |
Score | 1.3559704 |
Snippet | Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 57 |
SubjectTerms | Linux LSM Performance Evaluation Secure OS |
Title | Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066171&ppg=67 http://link.springer.com/10.1007/978-3-642-17610-4_7 |
Volume | 122 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKWYCBt3grAxNVUPOonW5AVVQhCkgFxGbFj0pdCqJlgF_Pne24bmGBJUqdOrH8Wfb57r7PhJzqVEkJQyGmJcvjvExpXIgiiYVUzUQn5VA3kSjcv6O9p_zmpfVSq12E7JKpOJdfv_JK_oMqlAGuyJL9A7L-pVAA94AvXAFhuC4Yv_NuVsvhcCfPBd5xM4GMJiWKH6BBiOmZVl_J57ejGtVo_DGafoaDpes1v01OXEAmQE4Lfkg37gcNm18QPg4q9jWSiPHMDQw7DPrxFSyQCu8e-s4L5rwLJkkt9C5U3sWGE99CKfXfBLgMGSSH7Q1t2kOl_eRqWcc_JuowNwMqok4lfDznbLYuVbF4ulBmFt_uVQc2O2B-JZy2OGVLZIkVeZ0sX3Zvbp-9lw3D1YziwYy-eczKLs2a67WorNzwQnvmdh4LwXJjgzxukDXkpURIGIEmbpKaHm-R9epUjshN0ltkNZCY3CZihlD0OowC7PCnhTa6H0QG2rnHQUUPLdbx0EYO2h3ydN197PRid65G_AbWI4slLVSqwVSEraYYNqWiKs0p1UlaSolxU5myNhtm7VwVqgUWnsiU1JlIVJGJErpul9THr2O9RyKZtLWEPYZEHUWq24VCE1mWKAKllc72SaPqPW6i_y7lWNq-mvA5EPfJWdXBHP884ZWoNgDDMw7AcAMMB2AO_vTqQ7IyG95HpD59_9DHYE5OxYkbM99b0HHx |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+Technology%2C+Disaster+Recovery+and+Business+Continuity&rft.atitle=Evaluation+of+Performance+of+Secure+OS+Using+Performance+Evaluation+Mechanism+of+LSM-Based+LSMPMON&rft.date=2010-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642176098&rft.volume=122&rft_id=info:doi/10.1007%2F978-3-642-17610-4_7&rft.externalDBID=67&rft.externalDocID=EBC3066171_65_67 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066171-l.jpg |