期刊文献+

安全操作系统的设计 被引量:3

Design of Secure Operating System
下载PDF
导出
摘要 SECOS是一个自主产权的安全操作系统,符合国家4级标准。该文总结了SECOS设计过程中的关键技术,包括:安全增强/改进设计方法,在Bell-La Padula强制访问模型基础上修改建立的理论模型及其实现,系统开发过程形式化设计,隐蔽信道分析方法及防范措施,客体重用等。安全系统性能估算测试表明SECOS的设计和实现是成功的。 SECOS is a secure operating system with independent intellectual property right, which accords with the requirements of level 4 secure operation system technology. This paper illustrates some key issues of the system, including design method for enchaneement of security, improved model from the Bell-La Padula MAC (mandatory access control) implementation, the realization of the model, formal method during the system development, conversiion channel analysis and its prevention, and secure deletion. The performance evaluation shows the design and implementation of SECOS is effective.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第12期179-181,246,共4页 Computer Engineering
基金 国家中小企业创新基金资助项目 浙江省创新基金资助项目(04C26223300568)
关键词 安全操作系统 强制访问控制 BLP模型 隐蔽信道 客体重用 SECOS MAC BLP Convert Channel Secure deletion
  • 相关文献

参考文献4

  • 1GA/T 388-2002 计算机信息系统安全等级保护操作系统技术要求[S].2002.
  • 2Bell D E,LaPadula L J.Secure Computer Systems:Mathema-tical Foundations[R].M74-244,1973.
  • 3Ravi S.Lattice-based Access Control Models[J].IEEE Computer,1993,26(11):9-19.
  • 4Gutmann P.Secure Deletion of Data from Magnetic and Solid-state Memory[C].Proceedings of the 6th USENIX Security Symposium,1996-07:77-90.

同被引文献20

  • 1蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624. 被引量:28
  • 2黄强,沈昌祥,陈幼雷,方艳湘.基于可信计算的保密和完整性统一安全策略[J].计算机工程与应用,2006,42(10):15-18. 被引量:26
  • 3李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 4BELL D E, LAPADULA L J. Secure computer systems: a mathematical model [R]. Bedford: ESD-TR- 73-278, 1973.
  • 5BELL D E, LAPADULA L J. Secure computer system: unified exposition and multics interpretation [R]. Bedford: MTR-2997 Rev. 1, 1976.
  • 6BIBA K J. Integrity considerations for secure computer systems [R]. Bedford: ESD-TR-76-732, 1977.
  • 7LIU Yi-he, CHEN Xing-shu. A new information security model based on BLP model and BIBA model [C]// The 7th International Conference on Signal Processing. Beijing: IEEE, 2004:2643-2646.
  • 8GERHARD S, WOLFGANG R, AXEL S. Verification of a formal security model for multiapplicative smart cards [C]// Proceedings of the 6th European Symposium on Computer Security. Toulouse: Springer- Verlag, 2000:17-36.
  • 9SCHWAN M. An extended model of security policy for multi-applieative smart cards [C]// Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2007: 226 - 233.
  • 10黄启真.Linux启动运行后可信计算的设计和实现[D].杭州:浙江大学,2008.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部