期刊文献+

Linux安全模块框架的研究和安全日志的实现 被引量:2

LSM Framework Research and Implementation of Security Logging
下载PDF
导出
摘要 Linux安全模块(LSM)是为主流Linux内核设计的一种轻量级、通用的访问控制框架,它提供了内核级的编程接口,已有多种不同的访问控制模型可以装载内核模块的形式在LSM框架上实现。对LSM的工作机制进行了研究,并实现了安全日志策略。 Linux Security Modules (LSM) is a lightweight, general purpose, access control framework for the mainstream Linux kernel. It provides lots of kernel-level interfaces of programming. Base on LSM framework, many different access control models have been implemented as loadable kernel modules. The mechanism of the LSM has been researched, and implemented a kind of security logging policy has been implemented.
作者 张浩 刘乃琦
出处 《计算机应用研究》 CSCD 北大核心 2006年第6期135-137,共3页 Application Research of Computers
关键词 LINUX安全模块 访问控制 安全日志 系统调用 Linux Security Modules Access Control Security Logging System Call
  • 相关文献

参考文献5

  • 1Chris Wright,Crispin Cowan,Stephen Smalley,et al.Linux Security Modules:General Security Support for the Linux Kernel[EB/OL].USENIX Security Symposium,http://lsm.immunix.org/docs/lsm-usenix-2002/html,2002-08/2005-02.
  • 2Chris Wright,Crispin Cowan,Stephen Smalley,et al.Linux Security Module Framework[EB/OL].Ottawa Linux Symposium,http://lsm.immunix.org/docs/lsm-ols-2002/html,2002-06/2005-03.
  • 3Stephen Smalley,Timothy Fraser,Chris Vance.Linux Security Modules:General Security Hooks for Linux[EB/OL].http://lsm.immunix.org /docs /overview /linuxsecuritymodule.html,2004-05/2005-03.
  • 4Stephen Smalley(NSA),Chris Vance(NAI Labs),Wayne Salamon (NAI Labs).Implementing SELinux as a Linux Security Module[R].NAI Labs Report,http://www.nsa.gov/selinux/module-abs.html,2002-05/2005-04.
  • 5Benjamin A Kuperman.A Categorization of Computer Security Monitoring Systems and the Impact on the Design of Audit Sources[D].Purdue University,http://www.cs.purdue.edu/AnnualReports/2003-2004/grad_cirriculum_learning.pdf,2004-08/2005-04.

同被引文献15

  • 1李云雪,苏智睿,王晓斌.基于Linux安全模块的通用框架研究与实现[J].计算机工程,2005,31(3):105-107. 被引量:10
  • 2http://tag.csdn.net/tag/solaris/1.html .
  • 3http://news.csdn.net/n/20071120/110870.html .
  • 4Bovet D P, Cesati M. Understanding the Linux kernel E M 1. s. 1. ~ : O' Reilly Media, Inc. , 2005.
  • 5Hildebrand D. An architectural overview of QNX [C]//Proe of USENIX workshop on mierokemels and other kernel architec- tures. [s. 1. ] :USENIX,1992:l13-126.
  • 6Degoyeneche J M, Desousa E A F. Loadable kernel modules [ J 1. IEEE Software, 1998,15 ( 1 ) :65-71.
  • 7Corbet J, Rubini A, Kroah-Hartman G. Linux device drivers [ M ]. [ s. 1. ]: O' aeiny Media, Inc. ,2005.
  • 8张丽芬,刘美华.操作系统原理教程[M].北京:电子工业出版社,2013.
  • 9Rajagopalan M, Hiltunen M, Jim T, et al. System call monito- ring using authenticated system calls [ J ]. IEEE Transactions on Dependable and Secure Computing,2006,3 (3) :216-229.
  • 10Matthew N, Stones R. Beginning Linux programming [ M ]. [ s. 1. ] :John Wiley & Sons,2011.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部