期刊文献+

WOLF-Linux的五层结构设计与实现

Design and implementation of WOLF-Linux with five-layer architecture
下载PDF
导出
摘要 构建基于Linux的嵌入式系统,对可靠性、安全性、功耗等具有较高的要求,因此需要一种模型来清晰完整的描述系统,指导系统的设计与实现。综合嵌入式系统各种要素,结合结构模型和层次思想,提出和分析了嵌入式系统五层结构模型,并将其应用于嵌入式Linux系统——WOLF-Linux的开发中。五层结构模型较好地指导了系统的完成,验证了该模型对于嵌入式系统设计与实现的有效性。 When building the embedded system based on Linux, there are higher requirements for reliability, security and power consumption. Therefore, a model is required to direct the design and implementation of the system while it describes the system clearly and fully. Integrating a variety of elements of the embedded system, combining with architecture model and layer thought, the five-layer architecture model of the embedded system is provided and analyzed. The model is applied to the development of an embedded Linux system which called WOLF-Linux. The system is completed very well by the direction of the five-layer model. It is proved that the fivelayer architecture model is available for the design and implementation of the embedded system.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第5期1166-1168,1171,共4页 Computer Engineering and Design
关键词 嵌入式LINUX 五层结构 嵌入式系统 本质安全 动态电源管理 embedded Linux five-layer architecture embedded system intrinsic security dynamic power management
  • 相关文献

参考文献6

  • 1李庆诚.翰林系列电子书的版权控制与支撑体系[EB/0L].http://www.jinke.com.cn/,2000.
  • 2李立新,陈伟民,黄尚廉.强制访问控制在基于角色的安全系统中的实现[J].软件学报,2000,11(10):1320-1325. 被引量:48
  • 3石文昌,孙玉芳.安全操作系统研究的发展(下)[J].计算机科学,2002,29(7):9-12. 被引量:24
  • 4Bishop Brock, Karthick Rajamani. Dynamic power management for embedded systems[DB/OL]. Proceedings of the IEEE International SOC Conference,2003:1 7-20.
  • 5Karim Yaghmour. Building embedded Linux systems[M].北京: O'Reilly,2003.
  • 6魏永明.Linux设备驱动程序[M].北京:中国电力出版社,2006.

二级参考文献74

  • 1Kühnhauser W E. On Paradigms for User-Defined Security Policies in Multipolicy Environments. In:11th IFIP Intl. Information Security Conf. , Cape Town, 1995
  • 2Kühnhauser W E. A Paradigm for User-Defined Security Policies. In: 14thIEEE Symposium on Reliable Distributed Systems.Bad Neuenahr, IEEE Press, 1995
  • 3Hosmer H H. Metapolicies II. In:Proc. of the 15th National Computer Security Conf. NIST-NCSC, United States Government Printing Office, 1992. 369~378
  • 4Secure Computing Corporation. DTOS Lessons Learned Report.CDRL Sequence No. A008, Secure Computing Corporation, Roseville, Minnesota, Jun. 1997
  • 5Saydjari O S,et al. Synergy: A Distributed, Microkernel-Based Security Architecture: [Technical Report: R231]. INFOSEC Research and Technology, Nov. 1993
  • 6Olawsky D,Fine T,Schneider E,Spencer R. Developing and Using a Policy Neutral Access Control Policy. In: Proc. of the UCLA Conf. on New Security Paradigms Workshops, ACM, USA,Sep. 1996
  • 7Secure Computing Corporation. DTOS Generalized Security Policy Specification. DTOS CDRL A019, Secure Computing Corporation, Roseville, Minnesota, Jun. 1997
  • 8Boebert W E,Kain R Y. A Practical Alternative to Hierarchical Integrity Policies. In:Proc. of the 8th National Computer Security Conf. Gaithersburg, MD, Oct. 1985.18~27
  • 9Badger L,et al. Practical Domain and Type Enforcement for UNIX. 1995 IEEE Symposium on Security and Privacy, 1995.66~77
  • 10Carney M, Loc B. A Comparison of Methods for Implementing Adaptive Security Policies. In:Proc. of the 7th USENIX Security Symposium, 1998. 1~14

共引文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部