期刊文献+

安全操作系统研究的发展(下) 被引量:24

The Development of Research on Secure Operating Systems(2)
下载PDF
导出
摘要 6 动态政策时期[0] 从单一政策支持到多种政策支持,安全操作系统迈出了向实际应用环境接近的可喜一步.然而,R.Spencer等指出[17],从支持多种安全政策到支持政策灵活性,还有相当一段距离.政策灵活性是动态政策时期的重要特征,1999年,Flask系统的诞生是动态政策时期的帷幕徐徐打开的标志. Prior to the work of this paper, our knowledge of the evolution history of secure operating systems was limited and primarily anecdotal. This paper proposes a classification method which divides the progress process of the research on secure operating systems into foundation period, cookbook period, multi-policy period and dynamic-policy period. The originating and developing procedure of the fundamental concepts. technologies and methods of secure operating systems is analyzed systematically according to the proposed classification method. As a result, a comprehensive perspective of the evolution course of the research on secure operating systems is presented. The discussion of the topic in question consists of two parts. This is the secont part.
出处 《计算机科学》 CSCD 北大核心 2002年第7期9-12,共4页 Computer Science
基金 国家自然科学基金(60073022) 国家863高科技项目(863-306-ZD12-14-2) 中国科学院知识创新工程项目(KGCXI-09)
关键词 安全操作系统 微内核 客体管理器 系统组件 Secure operating system, Evolution history, Development period. Multi-policy, Dynamic-policy
  • 相关文献

参考文献72

  • 1李立新,陈伟民,黄尚廉.强制访问控制在基于角色的安全系统中的实现[J].软件学报,2000,11(10):1320-1325. 被引量:48
  • 2Gligor V D. 20 Years of Operating Systems Security. In: Proc. of the 1999 IEEE Symposium on Security and Privacy, Oakland,California, May 1999. 108~110
  • 3Weissman C. Security Controls in the ADEPT-50 Time Sharing System. In:Proc. of the 1069 AFIPS Fall Joint Computer Conference, AFIPS Press, 1969. 119~133
  • 4Saltzer J H, Schroeder M D. The Protection of Information in Computer Systems. Proceedings of the IEEE, 1975,63 (9): 1278~1308
  • 5Landwehr C E. The Best Available Technologies for Computer Security. IEEE Computer, 1983,16(7):86~100
  • 6Foley S N, Li Gong, Qian Xiaolei. A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. In:Proc. of the IEEE Symposium on Security and Privacy, May 1996. 142~153
  • 7Whitmore J, et al. Design for MULTICS Security Enhancements.ESD-TR-74-176, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA, USA, Dec. 1973
  • 8CSC-STD-001-83, Department of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. DoD Computer Security Center, Aug. 1983
  • 9Ware W H. Security Controls for Computer Systems (U): Report of Defense Science Board Task Force on Computer Security:[Technical Report]. the Rand Corporation, Santa Monica, CA,published for the Office of the Director of Defense Research and Engineering, Washington, DC, Feb. 1970
  • 10DoD 5200. 28-STD, Department of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria.National Computer Security Center, Ft. Meade, MD, USA,Dec. 1985

二级参考文献2

  • 1Sanhu R S,IEEE Computer,1996年,29卷,2期,38页
  • 2Lunt T F,Research Directions in Database Security,1992年,98页

共引文献47

同被引文献121

引证文献24

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部