期刊文献+

基于程序的访问控制研究与实现 被引量:2

Research and Implementation on Program-based Access Control
原文传递
导出
摘要 论文首先分析了现有操作系统的访问控制技术,然后在传统访问矩阵模型的基础上,讨论了三维访问矩阵模型,提出了基于程序的访问控制思想。基于Linux内核下的通用访问控制框架,文章设计和实现了在Linux下基于程序权限的访问控制机制。 In this article, we firstly analyze access control technology of current operating system. Then we discuss the three dimension access model, based on traditional access control model. And, the paper introduces the concept of access control based on program.After that, we introduce Linux Security M. odule in Linux kernel 2.6. Finally, we design and implement the access control mechanism based on the program privilege.
出处 《信息安全与通信保密》 2006年第7期65-67,共3页 Information Security and Communications Privacy
基金 国家863信息安全重大项目(编号2002AA145090) 上海科委科技攻关项目(编号025115039)。
关键词 访问控制 LSM 主体 客体 权限 access control LSM subject object privilege
  • 相关文献

参考文献3

  • 1[1]Walker K M.Confining Root Programs with Domain and Type Enforcement.6th USENIX Security Symposium,August 1996
  • 2[2]Wright C.Linux Security Modules General Security Support for the Linux Kernel.In:USENIX Security Symposium,Sanfancisco,CA,August 2002
  • 3[5]Bovet D P,Cesati M.深入理解Linux内核.中国电力出版社,2001

同被引文献21

  • 1戴祝英,左禾兴.基于角色的访问控制模型分析与系统实现[J].计算机应用研究,2004,21(9):173-175. 被引量:22
  • 2陈岌,薛质,李生红,荆涛.整合分级的角色访问控制系统的研究与设计[J].信息安全与通信保密,2005(4):63-64. 被引量:1
  • 3袁皓,杨晓懿.信息安全模型安全控制研究[J].信息安全与通信保密,2007,29(2):78-80. 被引量:6
  • 4Christopher Strachey. Time Sharing in Large, Fast Computers Information Processing: Proceedings of the International Conference on Information Processing[C]. Paris: UNESCO, 1959: 01-29.
  • 5VMware Corporation. Understanding Full Virtualization, Paravirtualization, and Hardware Assist, White Paper[EB/OL]. ( 2007-11-10)[2009-08-13]. http: //www.vmware.com/files/pdf/VMware_ paravirtualization.pdf.
  • 6Gil Neiger, Amy Santony, Felix Leung, et al. Intel Virtualization Technology. Hardware Support for Efficient Processor Virtualization[J]. Intel Technology Journal, 2006, 08 (03): 167-178.
  • 7Lawton KP. Running Multiple Operating Systems Concurrently on An IA32 PC UsinK Virtualization Techniques[EB/OL]. (1999-11-29)[2009-08-13]. http: //denali.cs.washinglon.edu/relwork/papers/ plex86.txt.
  • 8VMware Corporation. Workstation User's Manual Workstation 6.5[EB/OL]. (2009-08-20)[2009-08-29]. http: //www.vmwa re.com/pdf/ws65_manual.pdf.
  • 9Greg Hoglund, James Butler.Rootkits: Subverting the Windows Kernel[M]. [s.l.]: Addison Wesley Professional, 2005: 49-69, 113-133.
  • 10Steven Hofmeyr. Host Intrusion Prevention: Part of the Operation System or on the Top of the Operating System[J]. Computers & Security, 2005, 24: 440-442.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部