Claims
- 1. A security framework for supporting kernel-based hypervisors within a computer system, the security framework comprising:
a security master; one or more security modules; and a security manager; wherein the security master and security modules execute in kernel space.
- 2. The security framework of claim 1, wherein the security manager executes in user space.
- 3. The security framework of claim 1, wherein one of the security modules is designed to apply a security policy to a specific application.
- 4. The security framework of claim 1, wherein one of the security modules is designed to apply a security policy to two or more different applications.
- 5. The security framework of claim 1, wherein one of the security modules enforces application-specific policy decisions for applications running in user space.
- 6. The security framework of claim 5, wherein the security module grants access to one or more computing resources as a function of the application requesting access.
- 7. The security framework of claim 5, wherein one of the security modules enforces resource-specific policy decisions for applications running in user space.
- 8. The security framework of claim 7, wherein the security module grants access to one or more computing resources as a function of the computing resource being requested.
- 9. The security framework of claim 7, wherein one of the security modules is designed to apply a security policy to a specific application.
- 10. The security framework of claim 7, wherein one of the security modules is designed to apply a security policy to two or more different applications.
- 11. The security framework of claim 1, wherein one of the security modules enforces resource-specific policy decisions for applications running in user space.
- 12. The security framework of claim 11, wherein the security module grants access to one or more computing resources as a function of the computing resource being requested.
- 13. The security framework of claim 11, wherein one of the security modules is designed to apply a security policy to a specific application.
- 14. The security framework of claim 11, wherein one of the security modules is designed to apply a security policy to two or more different applications.
- 15. The security framework of claim 11, wherein the security modules are hierarchically configured.
- 16. The security framework of claim 1, wherein the security modules are hierarchically configured.
- 17. The security framework of claim 1, wherein the security modules are designed so they can be loaded while the computing system is running.
- 18. The security framework of claim 1, wherein the security master includes a kernel-based facility for installing, configuring, monitoring and removing security modules.
- 19. The security framework of claim 1, wherein the security master includes:
a kernel-based facility for installing, configuring, monitoring and removing security modules; and entry points for registering a security module, intercepting system calls, releasing system calls, and communicating messages between security modules and user space.
- 20. The security framework of claim 1, wherein the security manager includes an interface for communicating with security master, wherein the interface permits a user to configure and control security modules from user space.
- 21. The security framework of claim 1, wherein the security manager includes an interface for communicating with security master, wherein the interface permits a user to configure and control security modules from user space, wherein management functions available to the user include:
the ability to list a set of rules that are being enforced by each security module; the ability to load a new set of rules for a particular security module; and the ability to log and view activity within the security framework.
- 22. The security framework of claim 1, wherein a user daemon executes in user space and allows the security master to initiate actions in user space.
- 23. The security framework of claim 7, wherein the security master includes a kernel-based facility for installing, configuring, monitoring and removing security modules.
- 24. The security framework of claim 7, wherein the security master includes:
a kernel-based facility for installing, configuring, monitoring and removing security modules; and entry points for registering a security module, intercepting system calls, releasing system calls, and communicating messages between security modules and user space.
- 25. The security framework of claim 7, wherein the security manager includes an interface for communicating with security master, wherein the interface permits a user to configure and control security modules from user space.
- 26. The security framework of claim 7, wherein the security manager includes an interface for communicating with security master, wherein the interface permits a user to configure and control security modules from user space, wherein management functions available to the user include:
the ability to list a set of rules that are being enforced by each security module; the ability to load a new set of rules for a particular security module; and the ability to log and view activity within the security framework.
- 27. The security framework of claim 7, wherein a user daemon executes in user space and allows the security master to initiate actions in user space.
Parent Case Info
[0001] This application is a continuation of U.S. application Ser. No. 09/247,721 filed on Feb. 9, 1999 which is incorporated herein by reference.
GOVERNMENT RIGHTS
[0002] This invention was made with Government support under Contract F30602-96-C-0338 awarded by the Air Force. The Government may have certain rights in this invention.
Continuations (1)
|
Number |
Date |
Country |
Parent |
09247721 |
Feb 1999 |
US |
Child |
10726290 |
Dec 2003 |
US |