期刊文献+

支持动态策略的安全核(Security Kernel)机制的研究 被引量:3

Research of Security Kernel Mechanism Supporting Dynamical Policies
下载PDF
导出
摘要 Security of information system requires a secure operation system. Security kernel meets the requirement and provides a bedrock to security of operation system. This paper extracts the deficiency of traditional security kernel, presents a security kernel mechanism supporting policy flexibility, simplified secure interface. It optimizes the performance by reused policy cache, provids a method to revoke granted permissions and assures the atomicity of revocation permissions and granting new permissions. As a result, all refinements help security kernel to improve its flexibility, extensibility and portability. Security of information system requires a secure operation system. Security kernel meets the requirement and provides a bedrock to security of operation system. This paper extracts the deficiency of traditional security kernel, presents a security kernel mechanism supporting policy flexibility, simplified secure interface. It optimizes the performance by reused policy cache, provids a method to revoke granted permissions and assures the atomicity of revocation permissions and granting new permissions. As a result, all refinements help security kernel to improve its flexibility, extensibility and portability.
出处 《计算机科学》 CSCD 北大核心 2002年第11期154-156,140,共4页 Computer Science
基金 国防预研项目基金
关键词 安全操作系统 动态策略 安全核机制 应用程序 计算机 Security kernel, TCB, Policy flexibility, Permission revocation
  • 相关文献

参考文献14

  • 1NCSC. Trusted Computer System Evaluation Criteria. Department of Defence U.S.A. 1985. DoD .5200. 28-STD
  • 2Trusted Information Systems, Inc. Trusted Mach System Architecture. Oct. 1 995
  • 3Key Logic, Inc. Introduction to KeySAFE. Key Logic Document SEC009
  • 4Secure Computing Corporation. DTOS Lessons Learned Report. DTOS CDRL A008,June 1997
  • 5Loscocco P,Smalley S. Integrating Flexible Support for Security Policies into the Linux Operating, NSA Labs, Jan. 2001
  • 6中软安全增强Linux.http:∥linux.cosix.com.cn
  • 7黎忠文,熊光泽.安全(Safety)内核机制的研究与实现[J].计算机科学,2001,28(4):87-90. 被引量:3
  • 8King R. Safety kernel enforcement of software safety policies: [Doctor Thesis]. USA: University of Virginia ,1995
  • 9Graham G S,Denning P J. Protection - principles and practice. In: Proc. AFIPS 1972 SJCC, AFIPS Press, 1972,40:417~429
  • 10Bell D E,La Padula L J. Secure computer systems: Mathematical foundations and model: [Technical Report M74-244]. The MITRE Corporation, May 1973

二级参考文献3

  • 1王志平.硬实时操作系统研究:博士论文[M].成都:电子科技大学,2000..
  • 2王志平,博士学位论文,2000年
  • 3蒋继洪,计算机系统、数据库系统和通信网络的安全与保密,1995年

共引文献2

同被引文献23

  • 1[2]Schneider F B. Enforceable security policies. ACM Transactions on Information and System Security (TISSEC), 2000,3 (1)
  • 2[3]Badger L, et al. Practical Domain and Type Enforcementfor UNIX. In: Proc. of the 1995 IEEE Symposiumon Security and Privacy,Oakland,California,May 1995. 66~77
  • 3[4]Ravi Sandhu. Role-based access control models. IEEE Computer,1996,29(2): 38~47
  • 4[6]Bell D E,LaPadula L J. Secure Computer Systems : Mathematical Foundations : [ESD-TR-73-278]. Vol. Ⅰ, AD 770 768, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, MA,USA, Nov. 1973
  • 5[7]Biba. Integrity Considerations for Secure Computer Systems:[ESD-TR-76-372 ]. Electronic Systems Division, Air Force Systems Command,Hanscom Air Force Base,Bedford,MA,USA,Apr. 1977
  • 6Majetic I, Leiss E L. Authorization and Revocation in Object-Oriented Databases. IEEE Trans. on Knowlegde and Data Engineering, 1997,19(4).
  • 7Bertino E, Jajodia S, Samarati P. A Non-Timestamped Authorization Model for Relational Databases. In:Proc. of the 3rd ACM Conf. on Computer and Communications Security, New Delhi, India,1996. 169~178.
  • 8Hagstrom A, et al. Revocations-A Classification. In: 14th IEEE Computer Security Foundations Workshop (CSFW'01), 2001.
  • 9Secure Computing Corporation. DTOS Lessons Learned Report.DTOS CDRL A008,June 1997.
  • 10Spencer R, et al. The Flask Security Architecture: System Support for Diverse Security Policies. In:Proc. of the 8th USENIX Security Symposium, Aug. 1999.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部