RAppArmor: Bindings to AppArmor and Security Related Linux Tools

Bindings to various methods in the kernel for enforcing security restrictions. AppArmor can apply mandatory access control (MAC) policies on a given task (process) via security profiles with detailed ACL definitions. In addition the package has kernel bindings for setting the process hardware resource limits (rlimit), uid, gid, affinity and priority. The high level R function 'eval.secure' builds on these methods to do dynamic sandboxing: it evaluates a single R expression within a temporary fork which acts as a sandbox by enforcing fine grained restrictions without affecting the main R process.

Version: 2.0.1
Depends: tools
Imports: parallel
Suggests: testthat, R.rsp
OS_type: unix
Published: 2016-03-11
Author: Jeroen Ooms
Maintainer: Jeroen Ooms <jeroen.ooms at stat.ucla.edu>
BugReports: http://github.com/jeroenooms/RAppArmor/issues
License: Apache License (== 2.0)
URL: http://www.jstatsoft.org/v55/i07/ http://github.com/jeroenooms/RAppArmor#readme
NeedsCompilation: yes
SystemRequirements: linux (>= 3.0), libapparmor-dev (optional)
Citation: RAppArmor citation info
Materials: NEWS
CRAN checks: RAppArmor results

Downloads:

Reference manual: RAppArmor.pdf
Vignettes: Enforcing Security Policies Using Dynamic Sandboxing on Linux
Package source: RAppArmor_2.0.1.tar.gz
Windows binaries: r-devel: not available, r-release: not available, r-oldrel: not available
OS X Mavericks binaries: r-release: not available, r-oldrel: not available
Old sources: RAppArmor archive

Reverse dependencies:

Reverse suggests: opencpu