期刊文献+

可信操作系统中可信客体的研究 被引量:3

Trusted objects in trusted operating system
下载PDF
导出
摘要 首先分析了操作系统中客体的类型,将客体分为静态客体和动态客体,然后总结了安全操作系统中对客体的处理存在的问题。在此基础路上,提出可信静态客体、可信动态客体和可信客体的概念,并分析了可信客体的特点以及与安全客体的关系。最后,提出了在可信操作系统客体的可信需求。为我们下一步将要开展的工作奠定基础。 The object types in the operating system, which were sorted into the static object and the dynamic object, were analyzed, and some deficiencies in accessing the object in the security operating system were pointed out. Then, the concepts of the trusted static object, the trusted dynamic object and the trusted object were put forward, and the characteristics of the trusted object, the relationship between the secure object and the trusted object was addressed. Finally, some requirements for the trusted object, which needed to be resolved in the trusted operating system, were presented and discussed. All of these are the foundation for our future works.
作者 谭良
出处 《计算机应用》 CSCD 北大核心 2008年第5期1186-1189,共4页 journal of Computer Applications
基金 国家863计划项目(863-104-03-01) 四川省科技攻关项目(03GG007-007)
关键词 安全操作系统 客体 可信操作系统 可信静态客体 可信动态客体 可信客体 security operating system object trusted operating system trusted static object trusted dynamic object trusted object
  • 相关文献

参考文献22

  • 1JAJODIA S,SAMARATI P,SUBRAHMANIAN V S,et al.A unified framework for enforcing multiple access control policies[J].ACM SIGMOD Record,1997,26(2):474-485.
  • 2GALIASSO P,BREMER O,HALE J,et al.Policy mediation for multi-enterprise environments[C]// Proceedings 16th Annual Computer Security Applications Conference(ACSA 2000).Washington,DC:IEEE Computer Society,2000:100-106.
  • 3ABRAMS M,LAPADULA L,EGGERS K,et al.A generalized framework for access control:An informal description[C]// Proceedings of the 13th National Computer Security Conference.Washington:NIST Press,1990:134-143.
  • 4BERTINO E,JAJODIA S,SAMARATI P.Supporting multiple access control policies in database systems[C]// Proceedings of the 1996 IEEE Symposium on Security and Privacy.Washington DC:IEEE Computer Society,1996:94-107.
  • 5OSBORN S,SANDHU R,MUNAWER Q.Configuring role-based access control to enforce mandatory and discretionary access control policies[J].ACM Transactions on Information and System Security,2000,3(2):85-105.
  • 6Secure Computing Corporation.DTOS lessons learned report,CDRL A008[R].Roseville,Minnesota:Secure Computing Corporation,1997.
  • 7BELL D E,LAPADULA L J.Secure computer systems:a mathematical model,ESD-TR-73-278[R].Bedford,MA:MITRE Corp,1973.
  • 8HARRISON M H,RUZZO W L,UNMAN J D.Protection in operating systems[J].Communications of the ACM,1976,19(8):461-471.
  • 9BIBA K J.Integrity considerations for secure computer systems,ESD-TR-76-372[R].Bedford,MA:USAF Electronic Systems Division,1977.
  • 10DENNING D E.A lattice model of secure information flow[J].Communications of the ACM,1976,19(5):236-242.

二级参考文献116

共引文献312

同被引文献45

  • 1李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 2Trusted Computing Group. TCG Specification Architecture Overview [S]. Reversion 1.4, 2007-08.
  • 3Sailer R, Zhang X, Jaeger T, et al. Design and implementation of a TCG-based integrigty measurement architecture[ C ]//Proceed -ings of the 13th USENIX Security Symposium, San Diego, CA, USA, August, 2004.
  • 4Korthaus R, Sadeghi A R, Stuble S, et al. A practical property-based bootstrap architecture [ C ]//Proceedings of the 2009 ACM workshop on Scalable trusted computing, ACM Press, Chicago, Illinois, USA, 2009:29 - 38.
  • 5Sadeghi A R, Stable C. Property-based attestation for computing plat-forms : Caring about properties, not mechanisms [ C ]//The 2004 New Security Paradigms Workshop, Virginia Beach, VA, USA, ACM Press, Sept. 2004. ACM SIGSAC.
  • 6Kubn U, Selhorst M, Stuble C. Realizing Property-based Attestation and Sealing with Commonly Available Hard-and Software [ C ]//Proceedings of the 2007 ACM workshop on Scalable trusted computing, New York, NY, USA, 2007.
  • 7L X Y, S C X, Z X D. An efficient attestation for trustworthiness of computing platform[ C]//Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06), 2006.
  • 8Haldar V, Chandra D, Franz M. Semantic remote attestation : a virtual machine directed approach to trusted computing[ C]//The Third virtual Machine Research and Technology Symposium(VM'04). USENIX, 2004.
  • 9Jcsang A. A logic for uncertain probabilities[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2001,9 (3).
  • 10Wagner D, Dean D. Intrusion detection via static analysis [ C ]//Proceedings : IEEE Symposium on Security and Privacy, Oakland, California, IEEE Computer Society, 2001:156 -.169.

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部