期刊文献+

Linux操作系统安全策略模拟的研究与设计 被引量:2

Research and Design of Linux Operation System Multiple Security Policies
下载PDF
导出
摘要 操作系统是计算机系统平台的核心和基础,从操作系统安全策略和安全模型的角度,分析了中国墙模型和Bell-La-padula(BLP)模型之间的区别与联系。为使操作系统有效地支持多种安全策略,设计了用中国墙模型非形式化地模拟实现BLP模型的过程,为操作系统对灵活安全策略的支持提供了例证。 Operation system is the kernel and basis of computer system platform.From the point view of operating system security policy and security model,analysed the difference and connection between Chinese wall model and the Bell-Lapadula(BLP) model.Process of utilizing CW model to simulate the Bell-Lapadula model in non-formal proof method is given,so as to support a variety and flexible of security polices realization for operation system.
出处 《工业控制计算机》 2012年第2期80-81,共2页 Industrial Control Computer
关键词 操作系统 安全 模型 策略 模拟 operation system security model security policy simulate
  • 相关文献

参考文献6

二级参考文献11

  • 1Bell D E, Leonard J L. Secure Computer System: Unified Exposition and MULTICS Interpretation[R], Bedford, MA, USA: The Mitre Corporation, Tech. Rep.: MTR-2997, 1976. 被引量:1
  • 2Feiertag R J, Levitt K N, Robinson L. Proving Multilevel Security of a System Design[C]. Proc. of the 6^th ACM Syrup. on Operating Syst.Principles, 1977: 57-65. 被引量:1
  • 3Denning D E. A Lattice Model of Secure information Flow[J].Communications of the ACM, 1976, 19(5): 236-243. 被引量:1
  • 4Bell T Y L, LaPadula A. A "New" Paradigm for an "Old" Model[C].Proceedings of the 1992-1993 Workshop on New Security Paradigms,1993: 82-93. 被引量:1
  • 5Lampson W. A Note on the Confinement Problem[J]. Communications of the ACM, 1973, 16(10): 613-615. 被引量:1
  • 6LOSCOCCO P,SMALLEY S.Meeting critical security objectives with security-enhanced Linux. http://lwn.net/2001/features/OLS/pdf/pdf/selinux.pdf . 2008 被引量:1
  • 7TEO L,AHN G-J.Towards the specification of access control poli-cies on multiple operating systems[].Proceedings of theIEEE Workshop on Information Assurance and Security.2004 被引量:1
  • 8National Security Agency.SELinux Background. http://www.nsa.gov/selinux/info . 2008 被引量:1
  • 9Red Hat,Inc.Red Hat Enterprise Linux4:Red Hat SELinux Guide. http://www.redhat.com . 2008 被引量:1
  • 10SMALLEY S.Configuring the SELinux policy. http://www.nsa.gov/selinux/papers/ . 2008 被引量:1

共引文献27

同被引文献7

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部