RAppArmor (Q33844): Difference between revisions
From MaRDI portal
Created claim: source code repository (P339): https://github.com/cran/RAppArmor, #quickstatements; #temporary_batch_1711027662947 |
Swh import (talk | contribs) SWHID from Software Heritage |
||||||||||||||
Property / Software Heritage ID | |||||||||||||||
Property / Software Heritage ID: swh:1:snp:709b017d01a93920b88a4416a80680380e00e134 / rank | |||||||||||||||
Normal rank | |||||||||||||||
Property / Software Heritage ID: swh:1:snp:709b017d01a93920b88a4416a80680380e00e134 / qualifier | |||||||||||||||
Property / Software Heritage ID: swh:1:snp:709b017d01a93920b88a4416a80680380e00e134 / qualifier | |||||||||||||||
point in time: 16 December 2023
|
Latest revision as of 20:16, 21 March 2024
Bindings to AppArmor and Security Related Linux Tools
Language | Label | Description | Also known as |
---|---|---|---|
English | RAppArmor |
Bindings to AppArmor and Security Related Linux Tools |
Statements
4 December 2023
0 references
Bindings to kernel methods for enforcing security restrictions. AppArmor can apply mandatory access control (MAC) policies on a given task (process) via security profiles with detailed ACL definitions. In addition this package implements bindings for setting process resource limits (rlimit), uid, gid, affinity and priority. The high level R function 'eval.secure' builds on these methods to perform dynamic sandboxing: it evaluates a single R expression within a temporary fork which acts as a sandbox by enforcing fine grained restrictions without affecting the main R process. A portable version of this function is now available in the 'unix' package.
0 references