Provides a New Way to Enhance Security in the Linux Operating System
Abstract
Keywords
References
Barisani, Andrea, and Thomas Bader. "Hacking Linux Exposed Linux security and secerets." (2008).
Cheminod, Manuel, Luca Durante, and Adriano Valenzano. “Review of Security Issues in Industrial Networks.” IEEE Transactions on Industrial Informatics 9, no. 1 (February 2013): 277–293. doi:10.1109/tii.2012.2198666.
Dheshmukh, Ashvini T., and Parikshit N. Mahalle. "Survey on Linux Security and Vulnerabilities." International Journal of Engineering And Computer Science 3, no. 09 (2014): 8265-8269.
Red Hat Engineering Content Services, Red Hat Enterprise Linux 6 Security Guide A Guide to Securing Red Hat Enterprise Linux, Edition 3, 2011.
Ben-Porat, U., A. Bremler-Barr, and H. Levy. “Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks.” IEEE Transactions on Computers 62, no. 5 (May 2013): 1031–1043. doi:10.1109/tc.2012.49.
Edwards, Nigel, Joubert Berger, and Tse Huong Choo. "A secure linux platform." In Proceedings of the 5th annual Linux Showcase & Conference-Volume 5, pp. 3-3. USENIX Association, 2001.
Lindskog, Stefan, and Erland Jonsson. "Different Aspects of Security Problems in Network Operating Systems." In Proceedings of the Third Annual International Systems Security Engineering Association Conference (2002 ISSEA Conference). 2002.
Holm, Hannes, Mathias Ekstedt, and Dennis Andersson. “Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks.” IEEE Transactions on Dependable and Secure Computing 9, no. 6 (November 2012): 825–837. doi:10.1109/tdsc.2012.66.
James Turnbull, “hardening Linux”, 2005.
Loscocco, Peter A., Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor, S. Jeff Turner, and John F. Farrell. "The inevitability of failure: The flawed assumption of security in modern computing environments." In Proceedings of the 21st National Information Systems Security Conference, vol. 10, pp. 303-314. 1998.
Jaromír Hradílek Red Hat, Inc. Engineering Content Services,”Red Hat Enterprise Linux 6 Deployment Guide Deployment, Configuration and Administration of Red Hat Enterprise Linux”, Edition 3, 2012.
DOI: 10.28991/esj-2018-01153
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 Hamid Reza Ganji, Kiarash Aghakhani