期刊文献+

基于微内核的VTOS安全核设计与实现

下载PDF
导出
摘要 为避免操作系统中访问控制机制被篡改、旁路,基于微内核多服务器结构设计并实现了安全核,为系统的机密性和完整性提供了保障。微内核结构的简单性和模块化为安全核的形式化验证奠定了基础。原型系统VTOS的安全核为用户提供多策略的访问控制,通过微内核多服务器结构为安全服务器提供了不可旁路性和完整性保障,确保安全策略的正确实施。
出处 《软件导刊》 2012年第5期122-124,共3页 Software Guide
基金 国家863计划基金项目(2011AA01A202) 国家自然科学基金项目(61021062)
  • 相关文献

参考文献7

  • 1LIMOGES C G,NELSON R R,HEIMANN J H. Versatile integrity and security environment(VISE) for computer systems[A].Little Compton,Rhode Island,1994.
  • 2LOSOCCOP,SMALLEY S. Integrating flexible support for security policies Into the linux operating sys-tem.rechnial report[R].NSA and NAI labs,2001.
  • 3ANDERSON J P. Computer security technology planning study.Volume Ⅱ.ESD-TR-73-51,Vol.Ⅱ[M].Electronic Systems Division,Air Force Systems Command,Hanscom Field,Bedford,MA,USA,1972.
  • 4石文昌,孙玉芳.安全操作系统研究的发展(下)[J].计算机科学,2002,29(7):9-12. 被引量:24
  • 5夏磊,黄皓,于淑英.混合多策略视图安全模型[J].计算机科学,2008,35(5):42-46. 被引量:4
  • 6S REICHELT,J STOESS,E BELLOSA. A microkemelapi for finegrained decomposition[A].2009.
  • 7S RUOCCO. Real-time programming and 14 microkernels[A].Platforms for Embedded Real-timeApplications,2006.

二级参考文献89

  • 1Kühnhauser W E. On Paradigms for User-Defined Security Policies in Multipolicy Environments. In:11th IFIP Intl. Information Security Conf. , Cape Town, 1995
  • 2Kühnhauser W E. A Paradigm for User-Defined Security Policies. In: 14thIEEE Symposium on Reliable Distributed Systems.Bad Neuenahr, IEEE Press, 1995
  • 3Hosmer H H. Metapolicies II. In:Proc. of the 15th National Computer Security Conf. NIST-NCSC, United States Government Printing Office, 1992. 369~378
  • 4Secure Computing Corporation. DTOS Lessons Learned Report.CDRL Sequence No. A008, Secure Computing Corporation, Roseville, Minnesota, Jun. 1997
  • 5Saydjari O S,et al. Synergy: A Distributed, Microkernel-Based Security Architecture: [Technical Report: R231]. INFOSEC Research and Technology, Nov. 1993
  • 6Olawsky D,Fine T,Schneider E,Spencer R. Developing and Using a Policy Neutral Access Control Policy. In: Proc. of the UCLA Conf. on New Security Paradigms Workshops, ACM, USA,Sep. 1996
  • 7Secure Computing Corporation. DTOS Generalized Security Policy Specification. DTOS CDRL A019, Secure Computing Corporation, Roseville, Minnesota, Jun. 1997
  • 8Boebert W E,Kain R Y. A Practical Alternative to Hierarchical Integrity Policies. In:Proc. of the 8th National Computer Security Conf. Gaithersburg, MD, Oct. 1985.18~27
  • 9Badger L,et al. Practical Domain and Type Enforcement for UNIX. 1995 IEEE Symposium on Security and Privacy, 1995.66~77
  • 10Carney M, Loc B. A Comparison of Methods for Implementing Adaptive Security Policies. In:Proc. of the 7th USENIX Security Symposium, 1998. 1~14

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部