Dissertation > Excellent graduate degree dissertation topics show

Research on Encrypted File System and Trusted Recovery of Secure Operating System

Author: XingChangLiang
Tutor: QingSiHan
School: Institute of Software
Course: Applied Computer Technology
Keywords: Secure Operating System Encrypting File System Trusted recovery Transactional file system
CLC: TP309
Type: Master's thesis
Year: 2005
Downloads: 201
Quote: 1
Read: Download Dissertation


With the development of computer and communications technology , information security technology is increasingly important, and operating system security is a necessary condition of the computer security . Encrypting File System and credible recovery is to protect computer security , and enhance the security of the operating system on two key technologies , this paper focus on to do more in-depth study of these two technologies . Research work in the following areas : First, analysis of the significance of the Encrypting File System on the security of the operating system on the basis of analysis and research of traditional Encrypting File System , based on the Linux system around the back of the working principle of the device proposed the design and implementation of a new encrypted file system , to overcome the traditional encrypted file system data protection incomplete , poor performance and other shortcomings . Of trusted recovery operating system developed for high-grade security significance , some of the key issues in the design of trusted recovery , analysis and summary of the various existing recovery techniques , a typical operating system research recovery mechanisms , and on this basis a credible recovery mechanism design , the idea of a transactional file system . China 's high-level secure operating system , the results of this study provide the technology and experience laid the foundation for the work on the development of high-grade secure operating system .

Related Dissertations

  1. In a distributed environment, Encrypting File System Design and Implementation,TP309.7
  2. Based on the study of the database the PKI encrypted file system,TP393.08
  3. Role-based access control mechanism independent Research and Implementation,TP316
  4. Study on Analysis Tools for SELinux Security Policy,TP393.08
  5. Method for Analyzing Security Policies of SELinux,TP393.08
  6. Research and design of security audit subsystem of the operating system,TP393.08
  7. Automatic Analysis of Covert Channel Based on Source Codes of Linux Kernel,TP309
  8. Design and Application Research of Secure Operating System Hybrid Multiple Policy Model,TP393.08
  9. Access control policy language research and design,TP393.08
  10. Study on Tools of SELinux Policy Configuration,TP393.08
  11. Simple operating system security research and design,TP393.08
  12. Linux security enhancement technology research and,TP316.81
  13. Secure Operating System Based on LINUX,TP316.81
  14. Embedded operating system information security research and implementation of nuclear technology,TP316
  15. A Review of Secure Operating System and Its Realizing Technology,TP316
  16. Research and Design of the Audit System in a 4~(th) Security Operating System,TP316
  17. Virtual Threads Architecture Basd on Network Gateway Operating System,TP316
  18. Research and Implementation on Trusted Authorization Techniques in Secure Operating System,TP316
  19. Research of Access Control Technology on Role-Based Authorization,TP393.08
  20. Secure operating system in the Covert Channel,TP316

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile