SELinux Symposium



Symposium Committees

Previous Meetings
2007 Symposium
2006 Symposium
2005 Symposium
2004 Meeting


Sponsorship opportunities

Contact Us


2006 Security Enhanced Linux Symposium Agenda


Policy Development Track SELinux Use and Administration Track
Feb. 27 Morning
8:30AM - 12PM
SELinux Policy Writing  
1:30PM - 5PM

Feb. 28 Morning
8:30AM - 12PM
Reference Policy Introduction to SELinux
1:30PM - 5PM
Building Cross-Domain and Perimeter Defense Solutions Managing Red Hat Enterpise Linux 4 and Fedora Core

Technical Sessions

March 1, 2006

7:30-10:30 Symposium Registration
8:00-8:30 Welcome Refreshments
8:30-10:00 Session 1: Opening
Welcome and Symposium Overview
Keynote Address: The Road to Practical Mandatory Security in Mainstream Operating Systems - an historical perspective.
Steve Walker, Steve Walker & Associates, USA
  SELinux Year in Review (invited talk)
Stephen D. Smalley, National Security Agency, USA
10:00-10:30 BREAK
10:30-12:00 Session 2: Security Architectures
10:30 Moving FLASK to BSD Systems (invited talk)
Chris Vance, SPARTA, Inc., USA
11:00 Design and Implementation of the SELinux Policy Management Server
Karl MacMillan, Joshua Brindle, Frank Mayer, David Caplan, and Jason Tang, Tresys Technology, USA
SlidesSlides SlidesPaper
11:30 Towards Automated Authorization Policy Enforcement
Vinod Ganapathy, University of Wisconsin - Madison, Somesh Jha and Trent Jaeger, Pennsylvania State University, USA
SlidesSlides SlidesPaper
12:00-1:30 LUNCH
1:30-3:00 Session 3: SELinux Policy Development
1:30 Reference Policy for Security Enhanced Linux
Chris PeBenito, Frank Mayer, and Karl MacMillan, Tresys Technology, USA
SlidesSlides SlidesPaper
2:00 Dynamic Policy Enforcement in a Network Environment
Mark Butler, Brandon Pollet, and John Hale, University of Tulsa, USA
SlidesSlides SlidesPaper
2:30 SELinux Protected Paths Revisited
Trent Jaeger, Pennsylvania State University, USA
SlidesSlides SlidesPaper
3:00-3:30 BREAK
3:30-5:30 Session 4: Works in Progress
3:30 Progress of SELinux Policy Editor
Yuichi Nakamura, The George Washington University, Hitachi Software, Japan
3:45 SLIDE: An Integrated Policy Development Environment
James Athey, Tresys Technology, USA
4:00 Integrating Multi-Category Security into Fedora
James Morris, Dan Walsh, Red Hat, USA
4:15 Protecting the Internet from Zombie Armies with DeSPAC-SE
Eric Freudenthal, University of Texas at El Paso, USA
4:30 A User-Space Monitor for High-Assurance Workflows
Jacques Thomas, Purdue University
4:45 Playing Well With Others: Implementing CIPSO on Linux
Paul Moore, HP, USA
5:00 Setools: Current Status and Future Directions
Kevin Carr, Tresys Technology, USA
5:30-8:00 Reception
6:00-8:00 Birds-of-a-Feather Sessions
6:00 Policy Development Tools
Karl MacMillan, Tresys Technology, USA
6:30 Linux Audit System
Steve Grubb, Red Hat, USA

March 2, 2006

8:00-8:30 Welcome Refreshments
8:30-10:15 Session 5: User and Application Issues
8:30 Keynote Address:UK e-Government: Security Challenges and Solutions for Innovative Service Delivery
Dr. Steve Marsh, UK Cabinet Office, UK
9:15 Case Study: Open Source and Commercial Applications in a Java-based SELinux Cross Domain Solution
Boyd Fletcher, Joint Forces Command - Joint Experimentation Directorate, USA
9:45 Case Study: Enhancing IBM Websphere with SELinux
Marc Hocking, Technology Cabinet Office, e-Government Unit, UK, Karl MacMillan, Tresys Technology, USA, and Doc Shankar, IBM, USA
SlidesSlides SlidesSlides
10:15-10:45 BREAK
10:45-12:15 Session 6: Policy Development and Languages
10:45 Experience Implementing a Higher-Level Policy Language for SELinux
Chad Sellers, James Athey, Spencer Shimko, Frank Mayer, and Art Wilson Tresys Technology, USA
SlidesSlides SlidesPaper
11:15 SENG: An Enhanced Policy Language for SELinux
Paul Kuliniewicz, Purdue University, USA
SlidesSlides SlidesPaper
11:45 Guided Policy Generation for Application Authors
Brian Sniffen, John Ramsdell, and David Harris, MITRE Corporation, USA
SlidesSlides SlidesPaper
12:15-1:45 LUNCH
1:45-3:15 Session 7: Policy Application and Analysis
1:45 Lessons Learned Developing Cross-Domain Solutions on SELinux
Karl MacMillan, Art Wilson, Spencer Shimko, Chad Sellers, and Frank Mayer, Tresys Technology, USA
SlidesSlides SlidesPaper
2:15 Lopol: A Deductive Database Approach to Policy Analysis and Rewriting
Aleks Kissinger and John Hale, University of Tulsa, USA
SlidesSlides SlidesPaper
2:45 Attack-based Domain Transition Analysis
Susan Hinrichs and Prasad Naldurg, University of Illinois at Urbana - Champaign, USA
SlidesSlides SlidesPaper
3:15-3:45 BREAK
3:45-5:15 Session 8: Evolution of MLS Extensions
3:45 SELinux and MLS: Putting the Pieces Together
Chad Hanson, Trusted Computer Solutions, Inc., USA
SlidesSlides SlidesPaper
4:15 Extending SELinux to meet LSPP data import/export requirements
Janak Desai, George Wilson, IBM Corporation and Chad Sellers, Tresys Technology, USA
SlidesSlides SlidesPaper
4:45 MCS - adding MLS features to the targeted policy
Russell Coker, Red Hat, Australia
5:15 Closing and Gift Raffle

Developer Summit

March 3, 2006

Developer Summit
An invitation only meeting for the core developers of SELinux to discuss future plans for SELinux and upcoming technologies. The Summit minutes are now available.
©Copyright 2005-2006 SELinux Symposium, LLC
Privacy Statement