期刊文献+

嵌入式系统中的SMACK应用研究 被引量:1

Application Research of SMACK in Embedded System
下载PDF
导出
摘要 介绍强制访问控制(MAC)方法和在Linux主流内核版本中MAC主要的实现技术,包括SELinux和SMACK。将SMACK应用到典型的嵌入式设备——智能手机上,通过定义SMACK规则为第三方软件构造沙盒。测试结果表明,与SELinux相比,SMACK具有较少的内存消耗和较高的运行效率,更适用于嵌入式系统。 This paper starts from an introduction of Mandatory Access Control(MAC) and presents some technologies which implement it in Linux mainline kernel,including SELinux and SMACK,and gives an example in detail of how to define SMACK rule set to address the requirements of constructing sandbox for third-party applications in Linux based mobile phone.Result of test indicates that running smack has fewer memory consumption and more efficient CPU performance comparing with SELinux,and SMACK is more suitable for embedded system..
作者 阮越 郑啸
出处 《计算机工程》 CAS CSCD 北大核心 2011年第5期161-163,166,共4页 Computer Engineering
基金 国家自然科学基金资助项目(61003311) 安徽省高等学校优秀青年教师科研基金资助项目(2007jq1028)
关键词 强制访问控制 简单强制访问控制内核 嵌入式系统 安全 沙盒 Mandatory Access Control(MAC) Simplified Mandatory Access Control Kernel(SMACK) embedded system security sandbox
  • 相关文献

参考文献9

  • 1Wright C, Cowan C, Smalley S, et al. Linux Security Modules: General Security Support for the Linux Kernel[C]//Proc. of USEN1X Security Symposium. San Francisco, California, USA: [s. n.], 2002: 17-31.
  • 2Bell D E, LaPadula L J. Secure Computer System: Unified Exposition and MULTICS Interpretation[R]. Bedford, USA: The MITRE Corporation, Tech. Rep.: MTR-2997. 1976.
  • 3Loscocco P A, Smalley S D. Integrating Flexible Support for Security Policies into the Linux Operating System[C]//Proc. of 2001 USENIX Annual Technical Conference. Berkeley, California, USA: [s. n.], 2001: 29-42.
  • 4徐宁,杨梦梦,刘文清.信任特征在SELinux策略服务器中的设计与应用[J].计算机工程,2008,34(12):254-256. 被引量:1
  • 5Schaufler C. Smack WhitePaper[EB/OL]. (2008-03-07). http:// www.schaufler-ca.com.
  • 6Nahari H. Trusted Secure Embedded Linux[C]//Proc. of 2007 Linux Symposium. Ottawa Ontario, Canada: [s. n.], 2007: 79-85.
  • 7McVoy L, Staelin C. Lmbench Documentation[EB/OL]. (2007- 11-27). http://www.bitmover.com/lmbench/.
  • 8Coker R. Porting NSA Security Enhanced Linux to Hand-held devices[C]//Proc, of 2003 Linux Symposium. Ottawa Ontario, Canada: [s. n.], 2003:117-127.
  • 9Nakamura Y, Sameshima Y. SELinux for Consumer Electronics Devices[C]//Proc. of 2008 Linux Symposium. Ottawa Ontario, Canada: [s. n.], 2008: 125-134.

二级参考文献5

  • 1Pfleeger C P. Security in Computing[M]. 4th ed. [S. l.]: Prentice Hall, 2006.
  • 2Mayer F, MacMillan K, Caplan D. SELinux by Example: Using Security Enhanced Linux[M]. [S. l.]: Prentice Hall, 2006.
  • 3中华人民共和国国家质量监督检验检疫总局,中国国家标准化管理委员会.中华人民共和国国家标准GB/T20272-2006信息安全技术,操作系统安全技术要求[S].2006.
  • 4TCG TPM Main Part Version 1.2 (1-4)[EB/OL]. (2003-10-01). http://www.trustedcomputinggroup.org/home.
  • 5TCG Software Stack Specification V1.2[EB/OL]. (2003-10-01). ht tp://www.trustedcomputinggroup.org/downloads.

同被引文献1

  • 1GY/T255-2012.可下载条件接受系统技术规范[S].北京,国家广播电影电视总局,2012.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部