期刊文献+

SELinux安全策略灵活性研究 被引量:1

Security Policy Flexibility Study in SE Linux
在线阅读 下载PDF
导出
摘要 安全操作系统要能够灵活充分地支持大量广泛的安全策略。这些灵活性需要支持控制访问权限的转移,执行细粒度的访问控制和撤消之前许可的访问权限。当前的一些系统在这些方面有所欠缺。本文介绍了一种操作系统安全构架可以解决当前的这些问题。构架提供了针对每个安全决策必须与安全策略做出协商的转移控制机制,使用保证安全决策一致性的安全决策缓存,并在服务组件中提供了细粒度的访问控制和撤消机制。 Secure 0S need adequate protection mechanisms to flexible support wide range of security policies.The policy flexibilities include controlling migrated access permissions,performing fine grain access control and revoking permitted access permission.But some 0S have shortcomings in these characteristics.The author introduces a flexible security architecture to overcome the limitation of traditional mechanisms.The architecture implemented the mechanisms to control migrated access permissions,to use access decision cache,fine grain control and migrated permission revocation mechanism.
出处 《信息工程大学学报》 2004年第2期143-146,共4页 Journal of Information Engineering University
关键词 安全策略 SE LINUX 访问控制 策略灵活性 security policy SE Linux access control policy flexibility
  • 相关文献

参考文献5

  • 1[1]Peter Loscocco, Stephen Smalley.Integrating Flexible Support for Security Policies into the Linux Operating System[J].2001,10:58-63.
  • 2[2]Peter Loscocco,Stephen Smalley,Patrick Muckelbauer,Ruth Taylor,S Turner, John Farrell.The Inevitability of Failure:The Flawed Assumption of Security in Modern Computing Environments[A].Proceedings of the 21st National Information Systems Security Conference[C].1998,40-50.
  • 3[3]Ray Spencer,Stephen Smalley,Peter Loscocco,Mike Hibler,David Andersen, Jay Lepreau.The Flask Security Architecture:System Support for Diverse Security Policies[A].Proceedings of the Eighth USENIX security Symposium[C].The USENIX Association,1999,8:32-40.
  • 4[4]Peter A Loscocco,Stephen Smalley. Meeting Critical Security Objectives with Security-Enhanced Linux[R].Technical Report,NAI Labs,2000.10.45-50.
  • 5李立新,陈伟民,黄尚廉.强制访问控制在基于角色的安全系统中的实现[J].软件学报,2000,11(10):1320-1325. 被引量:48

二级参考文献2

  • 1Sanhu R S,IEEE Computer,1996年,29卷,2期,38页
  • 2Lunt T F,Research Directions in Database Security,1992年,98页

共引文献47

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部