Dissertation > Excellent graduate degree dissertation topics show

A Review of Secure Operating System and Its Realizing Technology

Author: PuHaiTing
Tutor: WuLiangFu;LiTao
School: Sichuan University
Course: Computer Software and Theory
Keywords: Secure Operating System Nuclear Safety Access Control Covert Channels Security Audit TCB Security Policy Model Multi- level security policy Dynamic Security Policy LSM
CLC: TP316
Type: Master's thesis
Year: 2004
Downloads: 447
Quote: 19
Read: Download Dissertation

Abstract


Information technology and the rapid development of Internet technology has brought to people's lives and also to facilitate the introduction of a large number of security issues, such as the well-known computer viruses, hacker attacks. Therefore, for the security of computer information systems research is also increasingly get people's attention and concern, and the operating system is the cornerstone of all the computer information systems and key, so research and development of safe operating system is important, particularly in the design and development has intellectual property rights, high security and high reliability secure operating system for our national security and national security has important practical significance. This paper summarizes the 1960s to the present security research field of operating systems and the latest trends, given the five basic computer system security requirements: confidentiality, integrity, availability, controllability, and auditability, and analyzes the main computer system security threats to sources and methods. Then expounded computer information system security evaluation criteria, including the U.S. TCSEC, the international standard CC and the Chinese national standard GB17895-1999. Then depth study of the safety of nuclear and related concepts, detailed analysis of the operating system's security mechanisms and implementation technology. Security policy model is the design and implementation of a secure operating system, the paper delves into a variety of typical security policy model, and analyzes their advantages and disadvantages. Supports multi-level security policy is safe and dynamic security policies operating system is now a hot research and future trends, this article then analyzes the GFAC, DGSA, DTOS, Flask, such as several typical multi-level security policy and dynamic security policy architecture. Linux operating system because of its open source, performance, loud, etc., become developed country with independent copyright a good platform for a secure operating system, the paper in-depth analysis of the Linux operating system, the various security mechanisms and security flaws, a detailed analysis based on the Linux kernel secure operating system developed lightweight universal access control framework - LSM (Linux Security Module). Finally, proposed and implemented a Linux-based operating system security model - lt; WP = 3 gt; NisecLinux. The system implements network access based mandatory access control mechanism; through firewalls and intrusion detection system linkage greatly enhances system security capabilities; through VPN technology enables data transmission security supported by a support; using digital watermarking as a security audit log technology to ensure the integrity of the log; streamline the kernel and file system performance of the system can be improved.

Related Dissertations

  1. Study on Channel Allocation of Multi-Channel MAC Protocol in Ad-Hoc Network,TN929.5
  2. The Design and Implementation of DICOM Middle Software and Access Control Model in Formation Integration Platform,TP311.13
  3. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  4. Study on the Access Control of the Court Information System,TP309
  5. The Design and Implementation of Higher People’s Court Website That Based on Component and ASP Technology,TP311.52
  6. Research on Working Vacations Strategy of WLAN MAC Layer,TN925.93
  7. Multi-user Access Control Strategy for Power Distribution Network Based on OFDM,TN919.3
  8. Access Control System Design Based on Palm Vein Technology,TP273.5
  9. A Design Study of PLC Elevator Access Control System Based on RFID,TP273.5
  10. University Office System Design and Implementation,TP311.52
  11. Research on Safety of Sensitive Data in OA System,TP317.1
  12. Design and implementation of civil explosive industry online procurement system,TP311.52
  13. Research and Design of Virtual Research Center System of Yalong River Based on S2SH,TP311.52
  14. Fujian Telecom operation and maintenance operations audit system design and implementation,TP311.52
  15. Research on Purpose-based Access Control in Relational Database,TP311.13
  16. Research on Checking and Digesting Policy Conflicts Under Multi-Policy Environments,TP393.08
  17. Research and Implementation of Embeded Web System Security,TP393.08
  18. Design and Implementation of Network Access Control System Based on Portal Protocol,TP393.08
  19. Design and Realization of Distributed RFID Access Control System,TP273.5
  20. Research and Implementation on Smartcard Database Management System,TP311.52
  21. Design and Implement of Frequency EOC System and Research of Its Security Mechanism,TN915.02

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer software > Operating system
© 2012 www.DissertationTopic.Net  Mobile