{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T19:24:41Z","timestamp":1769023481789,"version":"3.49.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319590400","type":"print"},{"value":"9783319590417","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59041-7_7","type":"book-chapter","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T02:43:06Z","timestamp":1493865786000},"page":"116-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution"],"prefix":"10.1007","author":[{"given":"Amir","family":"Eaman","sequence":"first","affiliation":[]},{"given":"Bahman","family":"Sistany","sequence":"additional","affiliation":[]},{"given":"Amy","family":"Felty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,5]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Amthor, P., K\u00fchnhauser, W.E., P\u00f6lck, A.: Model-based safety analysis of SELinux security policies. In: 5th International Conference on Network and System Security (NSS), pp. 208\u2013215 (2011)","DOI":"10.1109\/ICNSS.2011.6060002"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Archer, M., Leonard, E.I., Pradella, M.: Modeling security-enhanced Linux policy specifications for analysis. In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III), pp. 164\u2013169 (2003)","DOI":"10.21236\/ADA413151"},{"key":"7_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07964-5","volume-title":"Interactive Theorem Proving and Program Development. Coq\u2019Art: The Calculus of Inductive Constructions","author":"Y Bertot","year":"2004","unstructured":"Bertot, Y., Cast\u00e9ran, P.: Interactive Theorem Proving and Program Development. Coq\u2019Art: The Calculus of Inductive Constructions. Springer, Heidelberg (2004)"},{"key":"7_CR4","volume-title":"The Art and Science of Computer Security","author":"MA Bishop","year":"2002","unstructured":"Bishop, M.A.: The Art and Science of Computer Security. Addison-Wesley Longman Publishing Co. Inc., Boston (2002)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/11908739_28","volume-title":"Advances in Information and Computer Security","author":"Y-M Chen","year":"2006","unstructured":"Chen, Y.-M., Kao, Y.-W.: Information flow query and verification for security policy of Security-Enhanced Linux. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 389\u2013404. Springer, Heidelberg (2006). doi:10.1007\/11908739_28"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/978-3-642-35236-2_60","volume-title":"Active Media Technology","author":"P Clemente","year":"2012","unstructured":"Clemente, P., Kaba, B., Rouzaud-Cornabas, J., Alexandre, M., Aujay, G.: SPTrack: visual analysis of information flows within SELinux policies and attack logs. In: Huang, R., Ghorbani, A.A., Pasi, G., Yamaguchi, T., Yen, N.Y., Jin, B. (eds.) AMT 2012. LNCS, vol. 7669, pp. 596\u2013605. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-35236-2_60"},{"key":"7_CR7","unstructured":"Coq Development Team: The Coq Proof Assistant Reference Manual (Version 8.6) (2016). https:\/\/coq.inria.fr\/distrib\/current\/files\/Reference-Manual.pdf"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3233\/JCS-2005-13105","volume":"13","author":"JD Guttman","year":"2005","unstructured":"Guttman, J.D., Herzog, A.L., Ramsdell, J.D., Skorupka, C.W.: Verifying information flow goals in Security-Enhanced Linux. J. Comput. Secur. 13(1), 115\u2013134 (2005)","journal-title":"J. Comput. Secur."},{"issue":"8","key":"7_CR9","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"MA Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM 19(8), 461\u2013471 (1976)","journal-title":"Commun. ACM"},{"key":"7_CR10","unstructured":"Hurd, J., Carlsson, M., Finne, S., Letner, B., Stanley, J., White, P.: Policy DSL: high-level specifications of information flows for security policies. In: High Confidence Software and Systems (HCSS) (2009)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Jaeger, T., Edwards, A., Zhang, X.: Managing access control policies using access control spaces. In: 7th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 3\u201312. ACM Press (2002)","DOI":"10.1145\/507711.507713"},{"key":"7_CR12","unstructured":"Jaeger, T., Sailer, R., Zhang, X.: Analyzing integrity protection in the SELinux example policy. In: 12th USENIX Security Symposium (2003)"},{"key":"7_CR13","unstructured":"Kissinger, A., Hale, J.C.: Lopol: a deductive database approach to policy analysis and rewriting. In: Security-Enhanced Linux Symposium, pp. 388\u2013393 (2006)"},{"key":"7_CR14","unstructured":"Loscocco, P., Smalley, S.D.: Meeting critical security objectives with Security-Enhanced Linux. In: Ottawa Linux Symposium, pp. 115\u2013134 (2001)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Marouf, S., Shehab, M.: SEGrapher: visualization-based SELinux policy analysis. In: 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), pp. 1\u20138 (2011)","DOI":"10.1109\/SafeConfig.2011.6111675"},{"key":"7_CR16","volume-title":"SELinux by Example: Using Security Enhance Linux","author":"F Mayer","year":"2006","unstructured":"Mayer, F., Caplan, D., MacMillan, K.: SELinux by Example: Using Security Enhance Linux. Prentice Hall, Upper Saddle River (2006)"},{"key":"7_CR17","unstructured":"Nakamura, Y., Sameshima, Y., Tabata, T.: SEEdit: SELinux security policy configuration system with higher level language. In: 23rd Large Installation System Administration Conference, pp. 107\u2013117 (2009)"},{"key":"7_CR18","unstructured":"National Security Agency: Security-Enhanced Linux (2016). https:\/\/www.nsa.gov\/what-we-do\/research\/selinux\/"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Reshetova, E., Bonazzi, F., Asokan, N.: SELint: an SEAndroid policy analysis tool. CoRR abs\/1608.02339 (2016)","DOI":"10.5220\/0006126600470058"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Reshetova, E., Bonazzi, F., Nyman, T., Borgaonkar, R., Asokan, N.: Characterizing SEAndroid policies in the wild. CoRR abs\/1510.05497 (2015)","DOI":"10.5220\/0005759204820489"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Singh, A., Ramakrishnan, C.R., Ramakrishnan, I.V., Stoller, S.D., Warren, D.S.: Security policy analysis using deductive spreadsheets. In: ACM Workshop on Formal Methods in Security Engineering (FMSE), pp. 42\u201350 (2007)","DOI":"10.1145\/1314436.1314443"},{"key":"7_CR22","unstructured":"Sistany, B.: A certified core policy language. Ph.D. thesis, University of Ottawa (2016). https:\/\/www.ruor.uottawa.ca\/handle\/10393\/34865"},{"key":"7_CR23","volume-title":"Computer Security, Principles and Practices","author":"W Stallings","year":"2008","unstructured":"Stallings, W., Brown, L.: Computer Security, Principles and Practices. Pearson Education, New York (2008)"},{"key":"7_CR24","unstructured":"The Fedora-SELinux Support List: Fedora SELinux Support. https:\/\/lists.fedoraproject.org\/admin\/lists\/selinux.lists.fedoraproject.org\/"},{"key":"7_CR25","unstructured":"Tresys Technology: APOL (2016). https:\/\/github.com\/TresysTechnology\/setools3"},{"key":"7_CR26","unstructured":"Tschantz, M.C.: The clarity of languages for access-control policies. Ph.D. thesis, Brown University (2005)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for access-control policy languages. In: 11th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 160\u2013169 (2006)","DOI":"10.1145\/1133058.1133081"},{"key":"7_CR28","unstructured":"Wang, R., Enck, W., Reeves, D.S., Zhang, X., Ning, P., Xu, D., Zhou, W., Azab, A.M.: EASEAndroid: automatic policy analysis and refinement for Security-Enhanced Android via large-scale semi-supervised learning. In: 24th USENIX Security Symposium, pp. 351\u2013366 (2015)"},{"issue":"3","key":"7_CR29","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s10207-012-0180-7","volume":"12","author":"W Xu","year":"2013","unstructured":"Xu, W., Shehab, M., Ahn, G.: Visualization-based policy analysis for SELinux: framework and user study. Int. J. Inf. Secur. 12(3), 155\u2013171 (2013)","journal-title":"Int. J. Inf. Secur."},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Xu, W., Zhang, X., Ahn, G.: Towards system integrity protection with graph-based policy analysis. In: 23rd Annual International Federation for Information Processing (IFIP), Data and Applications Security XXIII, pp. 65\u201380 (2009)","DOI":"10.1007\/978-3-642-03007-9_5"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Zanin, G., Mancini, L.V.: Towards a formal model for security policies specification and validation in the SELinux system. In: 9th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 136\u2013145. ACM Press (2004)","DOI":"10.1145\/990036.990059"},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-319-27998-5_19","volume-title":"Trusted Systems","author":"G Zhai","year":"2015","unstructured":"Zhai, G., Guo, T., Huang, J.: SCIATool: a tool for analyzing SELinux policies based on access control spaces, information flows and CPNs. In: Yung, M., Zhu, L., Yang, Y. (eds.) INTRUST 2014. LNCS, vol. 9473, pp. 294\u2013309. Springer, Cham (2015). doi:10.1007\/978-3-319-27998-5_19"}],"container-title":["Lecture Notes in Business Information Processing","E-Technologies: Embracing the Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59041-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:37:01Z","timestamp":1710355021000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59041-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319590400","9783319590417"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59041-7_7","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"5 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MCETECH","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on E-Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ottawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mcetech2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mcetech.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}