期刊文献+

在LINUX核心实施强制访问控制 被引量:2

Enforcing Mandatory Access Control in Linux Kernel
下载PDF
导出
摘要 1.引言 由于计算机和网络的广泛使用,迫切需要安全操作系统来作为其基础平台.为了确保计算机处理、存储信息的机密性,完整性和有效性,必须依靠高安全级的操作系统. The widespread use of computers and networks has emphasized the necessity for secure operating systems. The security research in operating system has shown that mandatory access control provided by operating system is essential for supporting secure applications. This paper presents the details of enforcing mandatory access control in Linux kernel, and the future work .
出处 《计算机科学》 CSCD 北大核心 2002年第9期143-145,共3页 Computer Science
基金 国家计委重大项目的支持
关键词 LINUX 操作系统 计算机 强制访问控制 文件系统 Mandatory access control, Secure operating system, Linux
  • 相关文献

参考文献14

  • 1刘文清,刘海峰,卿斯汉.基于Linux开发安全操作系统的研究[J].计算机科学,2001,28(2):52-54. 被引量:7
  • 2张志文,周明天.用内核ACL增强LINUX的安全性[J].计算机科学,2002,29(1):99-100. 被引量:1
  • 3Rusling D A . The Linux Kernel. January 1998
  • 4IEEE Draft P1003. le. IEEE Standard Department, 1997
  • 5Remy Card . Linux File Systems. Brueselles Oct. 1994
  • 6Louis-Dominique Dubeau. Ext2 file system. 1994
  • 7Bach M J. The design of Unix Operating System. Prentice-Hall,Inc. 1986
  • 8Trusted Computer System Evaluation Criteria. Department of Defence U.S.A. 1985. DoD 5200. 28-STD
  • 9Secure Computer System: Unified Exposition and Multics Interpretation. The Mitre Corporation . March 1976
  • 10Bell D E,LaPadula L J . Secure Computer Systems: Mathematical Foundations: [MITRE Technical Report 2547]. Volume I . March 1973

二级参考文献13

  • 1莫瑞.加瑟 吴亚非译.计算机安全的技术与方法[M].北京:电子工业出版社,1992..
  • 2Rusling D A.The Linux Kernel.Jan.1998
  • 3IEEE Draft P1003.le.IEEE Standard Department,1997
  • 4Remy Card.Linux File Systems.Brueselles Oct.1994
  • 5Louis-Dominique Dubeau.Ext2 file system.1994
  • 6Bach M J.The Design of Unix Operating System.Prentice-Hall,Inc.1986
  • 7Trusted Computer System Evaluation Criteria.Department of Defence U.S.A.1985.DoD 5200.28-STD
  • 8Secure Computer System: Unified Exposition and Multics Interpretation.The Mitre Corporation.March 1976
  • 9Bell E,LaPadula L J.Secure Computer Systems..Mathematical Foundations : [MITRE Technical Report 2547].Volume I.March1973
  • 10Bell D E.Secure computer system: A refinement of the mathematical model.Hanscom AFB.BEDford.MA.REP.ESD-TR-73-278,ESD/AFSC,1973,3

共引文献6

同被引文献16

  • 1GollmannD..Computer security[M].北京:人民邮电出版社,2003.25-49.
  • 2Pierangela S,De Capitani di Vimercati S.Accesscontrol policies,models,and mechanisms[M].Berlin Heidelberg:Springer Verlag,2001:137-162.
  • 3Huang Yimin,Ping Lingdi,Pan Xuezeng.Research on information security model and security system design[J].Journal of Zhejiang University,2001,35(6):603-607.
  • 4TanenbaumAS..Distributed operating systems[M].北京:清华大学出版社,1997.110-114.
  • 5徐明 庄毅.一种基于软件一致性协议的分布式共享存储器系统[J].南京大学学报:自然科学版,2001,37(10):265-268.
  • 6Wang Jinshuang,Zhang Tao,Zhang Yusen.Implementation and application of BLP model under Linux environment[J].Journal of PLA University of Science and Technology:Natural Science Edition,2004,5(3):20-23.
  • 7Henderson B.Linux loadable kernel module HOWTO [EB/OL].http://www.tldp.org/howto/module-howto/index.html,2004-01,2005-04-2.
  • 8Nagar R.Windows NT file system internals[M].Sebastopol USA O'Reilly:Sebastopol,1997:615-667.
  • 9肖永康,纪翠玲,谢宝恂,何珺.SELinux的安全机制和安全模型[J].计算机应用,2009,29(B06):66-68. 被引量:12
  • 10刘文清,卿斯汉,刘海峰.一个修改BLP安全模型的设计及在SecLinux上的应用[J].软件学报,2002,13(4):567-573. 被引量:14

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部