期刊文献+

可信操作系统研究 被引量:5

Research of trusted operating system
下载PDF
导出
摘要 简要回顾了安全操作系统的发展历史,指出了安全操作系统当前存在的主要问题;在此基础上提出了可信操作系统的概念,分析了可信操作系统的特点、内涵以及与安全操作系统的关系;最后提出了可信操作系统需要解决的问题,为下一步将要开展的工作奠定基础。 The developing history of the SOS( security operating system) was reviewed in brief, some problems in the SOS were pointed out. Moreover, the conception of the trusted operating system(TOS) was put forward, and the characters, the connotation of the TOS and the relationship between the TOS and the SOS were addressed. Finally, presented and discussed some requirements for the TOS, which needed to be resolved.
作者 谭良 周明天
出处 《计算机应用研究》 CSCD 北大核心 2007年第12期10-15,共6页 Application Research of Computers
基金 国家"863"计划资助项目(863-104-03-01) 2003年度四川省科技攻关资助项目(03GG007-007)
关键词 安全操作系统 可信操作系统 可信计算 security OS(SOS) trusted OS(TOS) trusted computing
  • 相关文献

参考文献34

  • 1ABBOTT R P, CHIN J S,DONNELLEY J E, et al. NBSIR 76-1041, Security analysis and enhancement of computer operating systems [ S ]. Gaithersburg, MD : [s. n. ] , 1976.
  • 2HOLLINGWORTH D, GLASEMAN S, HOPWOOD M. Security test and evaluation tools: an approach to operating system security analysis, 1 - 5298 [ R ]. Santa Monica : Calif Rand Corp, 1974.
  • 3LOSCOCCO P A, SMALLEY S D, MUCHELBAUER P A, et al. The inevitability of failure: the flawed assumption of security in modem computing environments [ C ]//Proc of the 21st National Information System Security Conference. Gaithersburg, MD: NIST Press, 1998: 396-407.
  • 4LEPREAU J, FORD B, HIBLER M. The persistent relevance of the local operating system to global applications [ C ]//Proc of SIGOPS European Workshop. New York : ACM Press, 1996 : 187-192.
  • 5BAKER D B. Fortresses built upon sand[ C]//Proc of UCLA Conference on New Security Paradigms Workshops. Lake Arrowhead, CA: [s.n. ] , 1996:148-153.
  • 6ANDERSON J P. Computer security technology planning study volume Ⅱ [ M]. Bedford, MA:HanscomAir Force Base, 1972.
  • 7JAJODIA S, SAMARATI P, SUBRAHMANIAN V, et al. A unified framework for enforcing in multiple access control policies [ C ]//Proc of ACM SIGMOD Int Conf on Management of Data. New York :ACM Press, 1997:474-485.
  • 8GALIASSO P, HALE O B J, SHENOI S, et al. Policy mediation for multi- enterprise environments [ C ]//Proc of the 16th Annual Computer Security Application Conference. New Orleans: [ s. n. ] ,2000 : 100-106.
  • 9ABRAMS M, LAPADULA L, EGGERS K, et al. A generalized framework for access control : an informal description [ C ]//Proc of the 13th National Computer Security Conference. Bedford, MA : [ s. n. ], 1990 : 134-143.
  • 10ABRAMS M, HEANEY J E, KING O, et al. Generalized framework for access control: towards prototyping the ORGCON policy [ C ]// Proc of the 14th National Computer Security Conference. Washington DC:[ s. n. ] ,1991:1-4.

二级参考文献79

共引文献320

同被引文献79

引证文献5

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部