Browser unable to execute script; please use the site map to navigate the site.

A Comparison Between ConSA and Current Linux Security Implementations

Hardy and Olivier


(Citation)Citation information

A. Hardy and M. S. Olivier. “A Comparison Between ConSA and Current Linux Security Implementations”. In: Database and Application Security XV. Ed. by M. S. Olivier and D. L. Spooner. Kluwer, 2002, pp. 211–224


There are many extensions to the Linux security model that are available. ConSA aims to provide a configurable architecture, and should allow many security systems to be implemented. A prototype ConSA system has been implemented in Linux. This paper will examine how ConSA relates to currently available Linux security extensions.

(Full text; password required)Full text

A pre- or postprint of the publication is available at
Note that a username and password are required to download the full text. (Why?) Please e-mail me and I will send you a username and password.

(Authoritative version on publisher's site)Definitive version

The definitive version of the paper is available from the publisher.
DOI: 10.1007/978-0-387-35587-0_15

(BibTeX record)BibTeX reference

author={Alexandre Hardy and Martin S Olivier},
title={A Comparison Between {ConSA} and Current {L}inux Security Implementations},
editor={Martin S Olivier and David L Spooner},
booktitle={Database and Application Security XV},
publisher={Kluwer} )