期刊文献+

一个安全操作系统的通用审计框架

A Generic Audit Framework for Secure Operating
在线阅读 下载PDF
导出
摘要 本文首先介绍了审计的基本概念和本文所描述工作所基于的项目背景。然后切入本文的重点——一个按照POSIX1003.1e标准,通用的安全操作系统审计框架的设计工作,以及此框架按照GB 17859-1999第三级别要求在一个Linux安全增强的操作系统上的具体实现工作。同时本文比较了国内相似的工作,分析了整个审计框架的优点与不足,并展望了将来的工作。 This paper first introduces the basic conceptions of secure auditing and the project background of the work. As the principal part of this work, the design of a platform and level independent audit framework conforming to POSIX standard and its implementation to a security enhanced linux platform conforming to the GB 17859-1999 third security level standard is presented. Then, this paper pays respect to the similar domestic works analyzing the framework's advantages and disadvantages. Finally, the view of the future work is depicted.
出处 《计算机科学》 CSCD 北大核心 2004年第7期148-152,共5页 Computer Science
基金 国家高技术研究发展计划863课题(2001AA144010)资助
关键词 安全操作系统 通用审计框架 POSIX1003.1e标准 日志 主体 客体 事件相关信息 Secure operating system,Audit,Log,Subject,Object,Case related information
  • 相关文献

参考文献9

  • 1[1]Draft Standard for Information Technology-Portable Operating System Interface (POSIX)-Part 1: System Application ProgramInterface (API)- Amendment #: Protection, Audit and Control Interfaces [C Language] IEEE Standards Department 1997
  • 2[2]Orange Book Parts Ⅰ and Ⅱ: THE CRITERIA and RATIONALE AND GUIDELINES NCSC/DOD/NIST Dec. 1985
  • 3[3]Anderson J P. Computer Security Threat Monitoring and Surveillance. James P. Anderson Co. , Fort Washington, PA,1980
  • 4[4]Bonyun D. The Role of a Well-Defined Auditing Process in the Enforcement of Privacy Policy and Data Security. In: Proc. of the 1981 IEEE Symposium on Security and Privacy, 1981. 19 ~ 26
  • 5[5]A Guide to Understanding Audit in Trusted Systems,The Rainbow Books. National Computer Security Center 1987
  • 6[7]Linux kernel 2.4.2.http:∥www.kernel.org
  • 7刘海峰,卿斯汉,刘文清.安全操作系统审计的设计与实现[J].计算机研究与发展,2001,38(10):1262-1268. 被引量:27
  • 8汪立东,方滨兴.Linux Shell安全审计机制的扩展[J].软件学报,2002,13(1):80-84. 被引量:14
  • 9[10]Bishop M. A standard audit trail format. In: Proc. of the 18th National Information Systems Security Conf. Baltimore, Maryland, USA, 1995

二级参考文献6

  • 1刘霞,网络安全、审查与控制.WindowsNT Server安全性专辑,1994年
  • 2GB 17859 1999 中华人民共和国国家标准:计算机信息系统安全保护等级划分准则 1999
  • 3Durst, R., Champion, T., Witten, B., et al. Testing and evaluating computer intrusion detection systems. Communications of the ACM, 1999,42(7):53~61.
  • 4Halflife. Linux TTY hijacking. Phrack Magazine, 1997,7(50):5~5.
  • 5Plaguez. Weakening the Linux kernel. Phrack Magazine, 1998,8(52):18~18.
  • 6刘美兰,姚京松.审计跟踪与入侵检测[J].计算机工程与应用,1999,35(7):12-15. 被引量:12

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部