期刊文献+

一个灵活的操作系统安全框架FMAC

FMAC:A Flexible Security Framework for Secure OS
下载PDF
导出
摘要 当前,操作系统的安全需求越来越多样、灵活和具体,它们往往只描述系统中一小部分实体之间的约束,但对安全策略的灵活性及定制的简洁性有较高的要求。传统的安全框架,如 FLASK 等,难于满足此类“轻量级”的安全需求。本文提出的 FMAC 框架专门面向此类安全需求,它定义了基于标记迁移系统 LTS 的安全策略模型,以规范和简化安全策略的定制。FMAC 框架由通用的对象管理器模型和安全策略管理器模型组成。讨论了 FMAC 在 Unix 类操作系统中的实现,通过层次式的客体组织与基于角色的主体组织,普通用户可以方便快捷地定制出满足要求的轻量级安全策略。 The security requirements of current operating system become more and more diverse, flexible and concrete. Usually, they only specify the constraints among a little set of entities of the system, but expect to be implemented quickly and expediently. These "lightweight" security requirements can't be satisfied well in traditional security framework like FLASK and this is why FMAC is presented. The FMAC model is made up of two sub-models named object manager and security policy manager. FMAC also defines a security policy model based on labeled transition system (I.TS)in order to standardize and facilitate the policy customization. How to implement FMAC in Unix-class operating systems is also discussed. It's simple to customize the lightweight security policies with the hierarchical structure of objects and role based structure of subjects which are two key elements of the implementation.
出处 《计算机科学》 CSCD 北大核心 2006年第1期153-157,共5页 Computer Science
基金 本文的研究得到了国家863重大软件专项"服务器操作系统内核"(项目编号:2002AAIZ2101)资助。
关键词 FMAC 操作系统安全 安全策略模型 强制访问控制框架 安全框架 操作系统 对象管理器 安全需求 普通用户 描述系统 FMAC, Operating system security, Security policy model, Mandatory access control framework
  • 相关文献

参考文献10

  • 1易晓东 何连跃 杨学军.安全操作系统基于角色的授权机制[J].计算机工程与科学,2004,.
  • 2Spencer R,Smalley S, Loscocco P,et al. The Flask Security Architecture: System Support for Diverse Security Policies. In: Proc. of the Eighth USENIX Security Symposium, 1999. 123-139.
  • 3Loscoeco P, Smalley S D. Meeting Critical Security Objectives with Security Enhanced Linux. In: Proceedings of the 2001 Ottawa Linux Symposium,2001.
  • 4Watson R,Feldman B, Migus A, et al. Design and Implementation of the Trusted BSD MAC Framework. In: Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX Ⅲ), 2003.
  • 5Watson R, Morrison W, Vance C, et al. The Trusted BSD MAC Framework.. Extensible Kernel Access Control for Free BSD 5.0.In:Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference (FREENIX '03),2003.
  • 6Lampson B W. Protection. In:Sth Princeton Symposium on Information Science and Systems, 1971.
  • 7Siewe F-Cau A, Zedan H. A compositional framework for access control policies enforcement. FMSE'03, ACM,2003.
  • 8Hale R W S. Programming in Temporal Logic: [PhD thesis].Trinity College, University of Cambridge, 1988.
  • 9Sandhu R S,Coyne E J, Feinstein H L, et al. Role-Based Access Control Models. IEEE Computer, 1996,29(2):38-47.
  • 10Loscocco P-Smalley - Integrating Flexible Support for Security Policies into the Linux Operating System. In: Proc. of the FREENIX Track of the 2001 USENIX Annual Technical Conf.2001.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部