RAppArmor: Bindings to AppArmor and Security Related Linux Tools

Bindings to various methods in the kernel for enforcing security restrictions. AppArmor can apply mandatory access control (MAC) policies on a given task (process) via security profiles with detailed ACL definitions. In addition the package has kernel bindings for setting the process hardware resource limits (rlimit), uid, gid, affinity and priority. The high level R function 'eval.secure' builds on these methods to do dynamic sandboxing: it evaluates a single R expression within a temporary fork which acts as a sandbox by enforcing fine grained restrictions without affecting the main R process. Recent versions on this package can also be installed on systems without libapparmor, in which case some features are automatically disabled.

Version: 2.0.2
Depends: tools
Imports: parallel
Suggests: testthat, R.rsp
OS_type: unix
Published: 2016-05-17
Author: Jeroen Ooms
Maintainer: Jeroen Ooms <jeroen.ooms at stat.ucla.edu>
BugReports: http://github.com/jeroenooms/RAppArmor/issues
License: Apache License (== 2.0)
URL: http://www.jstatsoft.org/v55/i07/ http://github.com/jeroenooms/RAppArmor#readme
NeedsCompilation: yes
SystemRequirements: linux (>= 3.0), libapparmor-dev (optional)
Citation: RAppArmor citation info
Materials: NEWS
CRAN checks: RAppArmor results


Reference manual: RAppArmor.pdf
Vignettes: Enforcing Security Policies Using Dynamic Sandboxing on Linux
Package source: RAppArmor_2.0.2.tar.gz
Windows binaries: r-devel: not available, r-release: not available, r-oldrel: not available
OS X Mavericks binaries: r-release: not available, r-oldrel: not available
Old sources: RAppArmor archive

Reverse dependencies:

Reverse suggests: opencpu


Please use the canonical form https://CRAN.R-project.org/package=RAppArmor to link to this page.