Dissertation > Excellent graduate degree dissertation topics show

Role-based access control mechanism independent Research and Implementation

Author: MengKaiKai
Tutor: WeiLiFeng
School: National University of Defense Science and Technology
Course: Computer Science and Technology
Keywords: Information Security Secure Operating System Discretionary Access Control Role Role-based discretionary access control
CLC: TP316
Type: Master's thesis
Year: 2009
Downloads: 27
Quote: 0
Read: Download Dissertation

Abstract


Operating system security is the foundation of information security, and operating system security is important to ensure the security of data in the operating system. Access control system, various types of data as a guarantee and an important means of document security, operating system security has been an important research direction. ACL-based discretionary access mechanisms can authorize individual users or groups of users, but this is usually because the user has authorized certain positions, if the authorized user is no longer assume the post, authority should be promptly withdrawn. However, due to complicated ACL setting operation, there may be a phenomenon not timely revocation. Buffer overflow attacks to gain root privileges for the target, is one of the most common and most dangerous means of attack. Although there are various ways to resist attempts to buffer overflow attacks, but is almost impossible to completely eliminate. Kylin secure operating system can restrict the attacker is successful in buffer overflow attacks acquisition system administrator role, the attacker can only get normal user privileges. However, there are a lot because the system owner to root file, an attacker once get through buffer overflow attacks as root, can cause security threats can not be overlooked. For discretionary access control is not timely revocation exist defects, this paper presents a fine-grained role-based discretionary access control mechanism RACL. The mechanism in the original ACL Kylin operating system based on the combined role of fixed weight RBA, in the autonomous authority introduced user role constraints, to achieve a role for the authorization and assume a specific role for the user in the access authorization. Through role limitations, allowing users to only assume that role, the user can have access authorization for that role. Once the user is no longer assume the role of a timely revocation of access authorization. Effective solution to the ACL permissions revoked without due permission timely diffusion problems. This Kylin operating system by modifying the original design and implement RACL ACL mechanism and performed functional tests. To reduce the buffer overflow attack is successful, the threat, the paper RACL has been improved, the definition file roles and mechanisms designed RACL_F. The mechanism based on the reduction in RACL authorization objects, reducing the difficulty of management; and the owner of the file when users access files, for role restrictions. Roles and files in the file is the main user's current role is inconsistent, the file owner user in accordance with other users treated for subsequent access control checks. Files and user roles through the constraints, making the attacker to gain root buffer overflow attack is successful identity, role limitations due, the attacker can not damage the system, reducing harmful levels of buffer overflow attacks. In this paper, Kylin access control framework to achieve this mechanism, and carried out functional and performance testing, to verify the effectiveness of the mechanisms and availability.

Related Dissertations

  1. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  2. Technology Research on Generation of Character Animation in Text to Scene Field,TP391.41
  3. National travel to minority women 's gender roles change research,F592.7
  4. Numerical Study on Phosphorus Distribution in Water Environment of the Three Gorges Reservoir,X832
  5. Play the main role of farmers in the new rural civic morality,D648
  6. The Role of Media in the Rural Daily Life,D422.7
  7. The Criticism on S-O-R Model and the Research on Anticipation Effect,B841
  8. Research on the Role of Our Government in the Development of Private Higher Learning Institutions,G648.7
  9. Growth Gain from Oblation: Study on the Process How Army Wives Adapt to Their Daily Lives,E225
  10. The Construction of College Teachers’ Role of the Theory of Ideology and Politics Course under the Visual Thershold of Inter-Subjectivity,G641
  11. Study on Strategy of Our National Confidential E-government Nets’ Information Security Construction,D630
  12. Study on the Interactive Mechanism of Energy Conservation and Pollution Reduction between Government and Enterprises,D922.68
  13. People-oriented market economy under the conditions of the guiding role of moral construction,D648
  14. Villagers system Role of village cadres,D422.6
  15. Communication in the ideological and political education counselor 's role to achieve,G641
  16. Higher Vocational Education Management Role of Government,G717
  17. Capital operation for mobile TV media role and position of Analysis,G220
  18. Confucian thought and its modern interpretation,D092
  19. RPG science curriculum for elementary school teaching game design research,G623.6
  20. Research and Design on Asymmetric Encryption and Decryption Algorithm Based on FFTT,TP309.7
  21. Military Research Institutions Position and Role of the National Innovation System Impact Factors Research,F426.48

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer software > Operating system
© 2012 www.DissertationTopic.Net  Mobile