期刊文献+

Linux安全操作系统的研究与改进 被引量:1

Research and Improvement of Secure Operating System on Linux
下载PDF
导出
摘要 针对系统应用中嵌入式系统的安全问题,该文在Linux操作系统内核层中采用改进/增强的开发方法。基于在Linux内核中加入强制访问控制机制(MAC)的方法,针对apache的进程访问进行SElinux安全策略配置,改进了对内核对象和服务的访问控制,改进了对apache服务器应用进程初始化、继承和程序执行的访问控制,严格定义其访问对象及访问权限,从而在保证进程正常运行的前提下,不仅防止了应用程序重要信息的泄漏,也最大限度地增强了访问控制的安全性,加强了网络服务的安全性,其安全级别可以达到B1级。 For security system applications in embedded systems,this paper use improved/enhanced developmentmethods in Linux operating system kernel layer,joining the mandatory access control mechanism(MAC)in the Linux kernel for analysis,carried out for the Apache process to access SElinux security policy configuration,that improved the access control on kernel objects and services,improved access control performedon the apache server application process initialization,inheritance and procedures,defined strictly accessobjects and access rights,so the premise of guaranteeing the process of running,not only to prevent an importantapplication information leakage,but also to maximize the enhanced access control security,to strengthenthe security of the network services and the security level can be reached B1level.
作者 吴聪 刘伟洋 陈侃松 Wu Cong;Liu Wei-yang;Chen Kan-song(Institute of Internet of Things,School of Computer Science and Information Engineering,Hubei University,Hubei Wuhan 430062)
出处 《电子质量》 2017年第4期53-57,共5页 Electronics Quality
关键词 Linux操作系统内核 MAC 进程访问 SELINUX Operating System Kernel Of Linux MAC Processes Accessing SELinux
  • 相关文献

参考文献6

二级参考文献41

  • 1赵辉,刘志勤,胡宝成.基于嵌入式实时操作系统的文件系统的研究与设计[J].航空计算技术,2004,34(3):73-75. 被引量:5
  • 2李云雪,苏智睿,王晓斌.基于Linux安全模块的通用框架研究与实现[J].计算机工程,2005,31(3):105-107. 被引量:10
  • 3罗俊,谭兴烈.基于LSM架构对Linux文件系统进行安全性增强[J].计算机工程与应用,2005,41(17):133-135. 被引量:4
  • 4Stephen Smalley, Chris Vance, Wayne Salamon. Implementing SELinux as a Linux security module[R].NAI Labs Report,2002.
  • 5Wright C,Cowan C,Morris J,et al.Linux security modules:General security support for the Linux kernel[C].Foundations of Intrusion Tolerant Systems(OASIS'03),2003:213-226.
  • 6Bishop M,Digler M.Checking for race conditions in file accesses [J].Computing Systems, 1996,9(2): 131 - 152.
  • 7Kroah-Hartman Greg.Using the kernel security module interface [Z].Linux Journal,2002:8-15.
  • 8Daniel P Bovet,Marco Cesati.Understanding the Linux kernel[M].南京:东南大学出版社,2006.
  • 9[1]R Spencer,S Smalley,P Loscocco,et al.The flask security architecture:System support for diverse security policies.The 8th USENIX Security Symposium,Washington,DC,USA,1999
  • 10[2]S D Smally.NSA Security-Enhanced Linux.http://www.nsa.gov/selinux/,2006

共引文献22

同被引文献4

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部