期刊文献+

安全操作系统中用户账号的管理(英文) 被引量:1

Administration of User Account in Secure OS
下载PDF
导出
摘要 很多安全操作系统都是基于类UNIX系统开发的,并按照TCSEC或CC的要求引入了强制访问控制和审计等安全机制,但是并未保证用户账号的唯一性,从而可能造成审计记录的混乱和用户权限的不正确重用,这就要求改变原来的类UNIX系统的账号管理方式。提出了在系统调用层截取修改系统账号文件这类事件以保证用户UID唯一性的方案,使得即使超级用户(包括通过成功的攻击而获取的超级用户权限)也无法任意修改用户账号数据库。这种机制已经在SLINUX系统中得到了实现。最后给出了该机制在SLINUX系统上的性能测试结果。 Many secure operating systems are developed based upon UNIX-like systems and many access control mechanisms and audit mechanism are introduced, but the system account file does not assure unique UID and might lead to confusion in audit trails. Users’ access rights in some security mechanisms are generally managed quite independently of account management and should also be deleted when one user is removed from the account file to avoid unintended reuse by another user. All those things require that the account file should be administrated in a way different from the traditional one in UNIX. Puts forward a mechanism to keep unique UID and to capture user account alteration in system call level. Puts the mechanism into practice in SLINUX, a variant of LINUX, and provide the performance analysis.
出处 《中国科学院研究生院学报》 CAS CSCD 2004年第1期95-100,共6页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 supportedbytheNational 863High techProgramofChina(863 3 0 6 ZD 12 14 2),theNationalNaturalScienceFoundationofChina(60 0 73 0 2 2 )andtheKnowledgeInnovationEngineeringProgramoftheChineseAcademyofSciences(KGCX 1 0 9)
关键词 安全操作系统 安全机制 审计 secure OS, security mechanism, audit
  • 相关文献

参考文献7

  • 1P Loscocco,S Smalley,P Muckelbauer,R Taylor,J Turner,J Farrell.The inevitability of failure:The flawed assumption of security in modern computing environments.In:Proceedings of the 21st National Information Systems Security Conference.1998.303-314.
  • 2National Computer Security Center.Department of defense trusted computer system evaluation criteria.DoD 5200.28-STD.1985.
  • 3The International Organization for Standardization.Common criteria for information technology security evaluation Part 1,2,3.1999.
  • 4Paul Whelan.Linux security auditing.Available at http://www.sans.org.2001.
  • 5Deborah Downs,Jerzy Rub,Kenneth Kung,Carole Joran.Issues in discretionary access control.In:Proceedings of the 1985 IEEE Symposium on Security and Privacy.IEEE Computer Society Press,1985.208.
  • 6Fort George G Meade.A guide to understanding audit in trusted systems.NCSC-TG-001.Version-2,Library No.S-228,470.1987.
  • 7Terry Escamilla.Intrusion detection:Network security beyond the firewall.Wiley Computer Publishing,1998.ISBN 0-471-29000-9.30.

同被引文献3

  • 1Futagawa J.Integrating Network Services of Windows and UNIX for Single Sign-on[C]//Proc.of International Conference on Cyberworlds.Tokyo,Japan:[s.n.],2004:324-328.
  • 2IETF.The Kerberos Network Authentication Service(V5)[S].RFC1510,1993.
  • 3Westerlund A.Heimdal and Windows 2000 Kerberos-How to Get Them to Play Together[C]//Proc.of USENIX Annual Technical Conference.Boston,USA:[s.n.],2001:267-272.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部