{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:29Z","timestamp":1750219829742,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,16]]},"DOI":"10.1145\/3584376.3584488","type":"proceedings-article","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T22:54:51Z","timestamp":1681944891000},"page":"638-641","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Application Research of security policy in the Linux operating system"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4628-0100","authenticated-orcid":false,"given":"Chunlin","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Mathematics and Computer Sciences, Xinyu University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8185-8900","authenticated-orcid":false,"given":"Shilan","family":"Wu","sequence":"additional","affiliation":[{"name":"Zte Institute of Information, Xinyu University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4137-7336","authenticated-orcid":false,"given":"Guangsheng","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Sciences, Xinyu University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8802-7926","authenticated-orcid":false,"given":"Chunrong","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Sciences, Xinyu University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8549-7532","authenticated-orcid":false,"given":"Lin","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Sciences, Xinyu University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9641-5435","authenticated-orcid":false,"given":"Fulian","family":"Zhong","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Sciences, Xinyu University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Linux Security Modules: General Security Support for the Linux Kernel [C]\/\/ 11th USENIX Security Symposium","author":"Wright C.","year":"2002","unstructured":"Wright C. Linux Security Modules: General Security Support for the Linux Kernel [C]\/\/ 11th USENIX Security Symposium . 2002 . Wright C. Linux Security Modules: General Security Support for the Linux Kernel [C]\/\/ 11th USENIX Security Symposium. 2002."},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE","author":"Tian D J","year":"2019","unstructured":"Tian D J , Hernandez G , Choi J I, LBM : A Security Framework for Peripherals within the Linux Kernel [C]\/\/ IEEE Symposium on Security and Privacy . IEEE , 2019 . Tian D J, Hernandez G, Choi J I, LBM: A Security Framework for Peripherals within the Linux Kernel [C]\/\/ IEEE Symposium on Security and Privacy. IEEE, 2019."},{"key":"e_1_3_2_1_3_1","volume-title":"Thin Hypervisor-Based User Authentication Mechanism for Linux Security Modules. The 2nd International Conference on Computer Science and Technology (CST2017)","author":"Yan B","year":"2017","unstructured":"Yan B , Zhao P , Hengtai M A , Thin Hypervisor-Based User Authentication Mechanism for Linux Security Modules. The 2nd International Conference on Computer Science and Technology (CST2017) . 2017 . Yan B, Zhao P, Hengtai M A, Thin Hypervisor-Based User Authentication Mechanism for Linux Security Modules. The 2nd International Conference on Computer Science and Technology (CST2017). 2017."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8059-5_10"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453078"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119578956.ch23"},{"key":"e_1_3_2_1_7_1","volume-title":"Wireless Communications and Mobile Computing","author":"Ding Y","year":"2020","unstructured":"Ding Y , Dong P , Li Z , SLR-SE Linux : Enhancing the Security Footstone of SEAndroid with Security Label Randomization [J] . Wireless Communications and Mobile Computing , 2020 . Ding Y, Dong P, Li Z, SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization [J]. Wireless Communications and Mobile Computing, 2020."},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"Mo H. CSDN.","year":"2022","unstructured":"Mo H. CSDN. 2022 . Understanding SELinux (MAC) under Linux , Retrieved December 10, 2022 from https:\/\/blog.csdn.net\/u012206617\/article\/details\/117530164. Mo H. CSDN. 2022. Understanding SELinux (MAC) under Linux, Retrieved December 10, 2022 from https:\/\/blog.csdn.net\/u012206617\/article\/details\/117530164."},{"key":"e_1_3_2_1_9_1","unstructured":"Surhone L M Timpledon M T Marseken S F FLASK [M]. Betascript Publishing 2010.  Surhone L M Timpledon M T Marseken S F FLASK [M]. Betascript Publishing 2010."},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"Damon","year":"2022","unstructured":"Damon database management system. 2022 . Retrieved December 10, 2022 from https:\/\/eco.dameng.com\/. Damon database management system. 2022. Retrieved December 10, 2022 from https:\/\/eco.dameng.com\/."}],"event":{"name":"RICAI 2022: 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence","acronym":"RICAI 2022","location":"Dongguan China"},"container-title":["Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3584376.3584488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:31Z","timestamp":1750178791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584376.3584488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":10,"alternative-id":["10.1145\/3584376.3584488","10.1145\/3584376"],"URL":"https:\/\/doi.org\/10.1145\/3584376.3584488","relation":{},"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}