Bindings to various methods in the kernel for enforcing security restrictions. AppArmor can apply mandatory access control (MAC) policies on a given task (process) via security profiles with detailed ACL definitions. In addition the package has kernel bindings for setting the process hardware resource limits (rlimit), uid, gid, affinity and priority. The high level R function 'eval.secure' builds on these methods to do dynamic sandboxing: it evaluates a single R expression within a temporary fork which acts as a sandbox by enforcing fine grained restrictions without affecting the main R process. Recent versions on this package can also be installed on systems without libapparmor, in which case some features are automatically disabled.
| Version: | 2.0.2 |
| Depends: | tools |
| Imports: | parallel |
| Suggests: | testthat, R.rsp |
| OS_type: | unix |
| Published: | 2016-05-17 |
| Author: | Jeroen Ooms |
| Maintainer: | Jeroen Ooms <jeroen.ooms at stat.ucla.edu> |
| BugReports: | http://github.com/jeroenooms/RAppArmor/issues |
| License: | Apache License (== 2.0) |
| URL: | http://www.jstatsoft.org/v55/i07/ http://github.com/jeroenooms/RAppArmor#readme |
| NeedsCompilation: | yes |
| SystemRequirements: | linux (>= 3.0), libapparmor-dev (optional) |
| Citation: | RAppArmor citation info |
| Materials: | NEWS |
| CRAN checks: | RAppArmor results |
| Reference manual: | RAppArmor.pdf |
| Vignettes: |
Enforcing Security Policies Using Dynamic Sandboxing on Linux |
| Package source: | RAppArmor_2.0.2.tar.gz |
| Windows binaries: | r-devel: not available, r-release: not available, r-oldrel: not available |
| OS X El Capitan binaries: | r-release: not available |
| OS X Mavericks binaries: | r-oldrel: not available |
| Old sources: | RAppArmor archive |
Please use the canonical form https://CRAN.R-project.org/package=RAppArmor to link to this page.