Font Size: a A A

Trusted I / O Resource Access Control Policy Research And Applications

Posted on:2010-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:P Y ZhouFull Text:PDF
GTID:2208360275498505Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of computer communication technology and information technology to improve, more and more people communicate with each other through the internet. There is a growing emphasis on information security issues. But at present, the focus of security on the network is more concentrated in their own protection, while neglect of I/O device safety. In fact the majority of attacks are caused by the insecure terminal system, thus I/O terminal security issues is very important in this essay. Starting from the terminal we can monitor the source of insecurity and solve the problem of the vast majority of attacks.In an analysis of the meaning of trusted computing as well as the current I/O resource security access control at home and abroad,based on primary and secondary core,dual-platform operating system security,we put forward a trusted I/O resource access control framework. In the framework users' visiting the I/O resources is controlled through authentication, access control and other technologies. The basic idea is: The user who passes the authentication can be given permission to use the system I/O resources. Non-system authentication or unauthorized users will be prevented from operating the I/O resources.This paper, taking U disk and network card of the two most commonly used I/O device as an example, we design and realize the above trusted I/O resource access control system. To achieve, it includs a password-based authentication module, the data based on the RC4 algorithm for encryption and decryption modules, as well as role-based access control module. After the experiment it proved that these security module can run in the stable security platform in the embedded board. The mutual combination of these modules can guarantees the U disk and network card's trustable visit.
Keywords/Search Tags:Trusted, Authentication, Password Protect, Acces control policy, Special Chanel
PDF Full Text Request
Related items