期刊文献+

基于Linux安全模块的通用框架研究与实现 被引量:10

Study and Implementation of Common Framework Based on Linux Security Module
下载PDF
导出
摘要 给出了LSM安全通用框架的原型构造和实现技术,并以SELinux为例论述了安全通用框架栈式堆叠安全模块,最后分析了通用框架的局限性并提出了改进方法。 This paper first presents the architecture of the LSM framework and the technology of implementation. SELinux security module is then given as a case to express the technique how the security common framework stacks up several security modules. Finally the limitation of common framework is analyzed and a amendment measure is supposed.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第3期105-107,172,共4页 Computer Engineering
关键词 通用框架 模块 安全 实现技术 堆叠 原型 改进方法 Common framework LSM Security module Capabilities logic Hook function SELinux
  • 相关文献

参考文献5

  • 1Chris W, Crispin C, Stephen S, et al. Linux Security Modules:General Security Support for the Linux Kernel. In USENIX Security Symposium, San Francisco, CA, 2002-08
  • 2Ray S, Stephen S, Peter L, et al. The Flask Security Architecture:System Support for Diverse Security Policies. NSA Technical Report.2001-02
  • 3石文昌,孙玉芳.多级安全性政策的历史敏感性[J].软件学报,2003,14(1):91-96. 被引量:19
  • 4Peter L, Stephen S. Integrating Flexible Support for Security Policies into the Linux Operating System. USENIX Annual Technical Conference, The U SENIX Association, 2001-06
  • 5Stephen S, Chris V, Wayne S. Implementing SELinux asa Linux Security Module.NAI Labs Report #01-043, 2002-05

二级参考文献1

  • 1国家质量技术监督局.计算机信息系统安全保护等级划分准则.GB17859-1999[M].北京:中国标准出版社,1999..

共引文献18

同被引文献31

  • 1罗俊,谭兴烈.基于LSM架构对Linux文件系统进行安全性增强[J].计算机工程与应用,2005,41(17):133-135. 被引量:4
  • 2王振江,刘强.基于RBAC的扩展访问控制模型[J].计算机工程与应用,2005,41(35):23-25. 被引量:9
  • 3张浩,刘乃琦.Linux安全模块框架的研究和安全日志的实现[J].计算机应用研究,2006,23(6):135-137. 被引量:2
  • 4Stephen Smalley, Chris Vance, Wayne Salamon. Implementing SELinux as a Linux security module[R].NAI Labs Report,2002.
  • 5Wright C,Cowan C,Morris J,et al.Linux security modules:General security support for the Linux kernel[C].Foundations of Intrusion Tolerant Systems(OASIS'03),2003:213-226.
  • 6Bishop M,Digler M.Checking for race conditions in file accesses [J].Computing Systems, 1996,9(2): 131 - 152.
  • 7Kroah-Hartman Greg.Using the kernel security module interface [Z].Linux Journal,2002:8-15.
  • 8Daniel P Bovet,Marco Cesati.Understanding the Linux kernel[M].南京:东南大学出版社,2006.
  • 9Allen J,Christie A,Fithen W, et al. State of the practice of intrusion detection technologies. Software Engineering Institute, Carnegie Mellon University. 2000.
  • 10曹江华.国晓平.Linux系统运维.电子工业出版社.

引证文献10

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部