Windows-level enforcement in SELinux?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Title: Windows-level enforcement in SELinux?

Hello,

Ive been tasked to map out a path for migrating a MLS application from Trusted Solaris to SELinux.  Im sure Ill have many questions to come, but after some initial readings one of my first is:

How does SELinux label individual X-windows in a user session, so that (for example) data contained in a high-level security window cannot be copied and then pasted into a lower-level security window?

Thanks in advance!
Mark


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux