期刊文献+

安全操作系统的审计子系统设计 被引量:1

Design of an audit subsystem for security of OS
下载PDF
导出
摘要 基于提高操作系统自身的安全性是增强系统安全的关键因素,审计子系统又是安全操作系统的重要组成部分,描述了一个基于SELinux的审计子系统.讨论了该系统的功能及几个关键问题,并提出了一种集中安全审计的框架,对SELinux内核进行了设计. Enhancing the security of operating system is the key to improving the system security. The audit subsystem is a crucial part of secured operating system. An audit subsystem based on SELinux was described, the system function and a few key questions were discussed, a framework of concentrative security audit was presented. The design of SELinux kernel was conducted, also.
作者 张小梅 李希
出处 《兰州理工大学学报》 CAS 北大核心 2006年第6期111-113,共3页 Journal of Lanzhou University of Technology
基金 国家863计划项目(2002AA141100)
关键词 安全操作系统 审计 SELinux内核 secure OS audit SELinux kernel
  • 相关文献

参考文献6

二级参考文献19

  • 1卿斯汉,朱继锋.安胜安全操作系统的隐蔽通道分析[J].软件学报,2004,15(9):1385-1392. 被引量:19
  • 2Chris Brenton Cameron Hunt著 马树奇 金燕译.网络安全积极防御从入门到精通[M].北京:电子工业出版社,2001..
  • 3The International Organization for Standardization. Common Criteria for Information Technology Security Evaluation. ISO/IEC 15408:1999(E),1999.
  • 4GB17859-1999.中华人民共和国国家标准:计算机信息系统安全保护等级划分准则.[S].中国国家质量技术监督局,1999..
  • 5DoD 5200.28-STD, Department of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. National Computer Security Center, Ft. Meade, MD, USA, 1985.
  • 6Miller B P, Koski D, Lee C P et al. Fuzz revisited: A re-examination of the reliability of UNIX utilities and services. Computer Sciences Department, University of Wisconsin, Wisconsin:Technical Report: CS-TR-95-1268, 1995
  • 7Lee W, Stolfo S J. Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, US,1998
  • 8Wack J P, Carnahan L J. Keeping your site comfortably secure: An Introduction to Internet Firewalls. NIST Special Publication 800-10, U.S. DEPARTMENT OF COMMERCE. http://csrc.nist.gov/publications/nistpubs/800-10/
  • 9Hollingworth, Glaseman D S, Hopwood M. Security test and evaluation tools: An approach to operating system security analysis. Rand Corporation, Santa Monica, California:Technical Report P-5298, 1974
  • 10Abbott R P et al. Security analysis and enhancement of computer operating systems. NBSIR 76-1041, Nat1 Bureau of Standards, ICST, Gaithersburg, Md., Apr. 1976

共引文献23

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部