翻訳と辞書
Words near each other
・ Appendichordella
・ Appendicitis
・ Apparition (EP)
・ Apparition (The Legendary Pink Dots album)
・ Apparition Mountain
・ Apparition of Christ to the Virgin
・ Apparition of Face and Fruit Dish on a Beach
・ Apparition of the Virgin of the Pillar to Saint James and his Saragossan disciples
・ Apparition of the Virgin to St Bernard (Filippino Lippi)
・ Apparitional (film)
・ Apparitional experience
・ Apparitions (song)
・ Apparitions (TV series)
・ Apparitions of Melody
・ Apparitor
AppArmor
・ AppArmor Mobile
・ Apparsuit Island
・ Apparswami Temple
・ Appartement du roi
・ Appaserver
・ Appassionata (album)
・ Appassionata (film)
・ Appassionato
・ Appassionato (album)
・ Appasus
・ Appat Island
・ Appatlo Okadundevadu
・ Appavaram
・ Appavin Meesai


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

AppArmor : ウィキペディア英語版
AppArmor

AppArmor ("Application Armor") is a Linux kernel security module that allows the system administrator to restrict programs's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. AppArmor supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It was included in the mainline Linux kernel since version 2.6.36 and its development has been supported by Canonical Ltd. since 2009.
In addition to manually creating profiles, AppArmor includes a learning mode, in which profile violations are logged, but not prevented. This log can then be used to generate an Apparmor profile, based on the program's typical behavior.
AppArmor is implemented using the Linux Security Modules (LSM) kernel interface.
AppArmor is offered in part as an alternative to SELinux, which critics consider difficult for administrators to set up and maintain.〔(【引用サイトリンク】 Linux.com :: SELinux: Comprehensive security at the price of usability )〕 Unlike SELinux, which is based on applying labels to files, AppArmor works with file paths. Proponents of AppArmor claim that it is less complex and easier for the average user to learn than SELinux. They also claim that AppArmor requires fewer modifications to work with existing systems: for example, SELinux requires a filesystem that supports "security labels", and thus cannot provide access control for files mounted via NFS. AppArmor is filesystem-agnostic.
== Other systems ==

AppArmor represents one of several possible approaches to the problem of restricting the actions that installed software may take.
The SELinux system generally takes an approach similar to AppArmor. One important difference is that SELinux identifies file system objects by inode number instead of path. This means, for example, while a file that is inaccessible may become accessible under AppArmor when a hard link to it is created, SELinux would still deny access through the newly created hard link, since the underlying data that is referenced by the inode would be the same.
SELinux and AppArmor also differ significantly in how they are administered and how they integrate into the system.
Isolation of processes can also be accomplished by mechanisms like virtualization; the One Laptop per Child (OLPC) project, for example, sandboxes individual applications in lightweight Vserver.
In 2007, the Simplified Mandatory Access Control Kernel was introduced.
In 2009, a new solution called Tomoyo was included in Linux 2.6.30; like AppArmor, it also uses path-based access control.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「AppArmor」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.