Font Size: a A A

Truested Booting, Trusted Filesystem And Trusted Application Of Operating System

Posted on:2008-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z T HuFull Text:PDF
GTID:2178360212974149Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The security technology of operation system is the foundation to resolve information security problem. In China, one of the important directions to study secure operation system now emphasizes on the architecture and framework of them. But the research is a process moving from military area to commercial area, so at present, domestic research have not enough items on the security OS architecture for primary commercial using. With the fast development of network technique and with the emergence of diversification security threats, traditional design theory and structure of security OS can't solve the secure problems in actual world. In this paper, we research and implement some trusted problems based on Linux.The paper first describes the secure operating system and the general idea of trusted computing, including the function and the development of the trusted computing in constructing a secure operating system. Then we research the implementation of trusted booting, trusted file systems, and trusted applications based on the theory of trusted operating system, the demand of trusted computing and the idea of secure trusted chain of OS. Then, we implement the part of the chain using trusted Grub, trusted kernel and Initrd, LSM technology on Linux operating system, together with the creative architecture of trusted applications proving. At last, we bring up some improvements about trusted theory and implementation of trusted chain of operating system.
Keywords/Search Tags:trusted computing, operating system, kernel, application, LSM
PDF Full Text Request
Related items