Font Size: a A A

Security System Reaserching And Realizing Based On Linux

Posted on:2007-12-26Degree:MasterType:Thesis
Country:ChinaCandidate:J N LiuFull Text:PDF
GTID:2178360218962434Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Along with the development of science and economy, information technology affects people increasingly The development of Internet makes the application of computer became widespread. But the security problem becomes more and more important at the same time.The information security means the technical which is used to secure the information system and protect the information from changing, leaking or destroying by a man without proper authorization. The operating system security including Identity Authentication. Access Corrtrol,Security Anrlit. encrypt and decrypt. Role based access control and cte,is the kernel of information security.In fact, the computer users including person users and corporation users have not enough professional knowledge to protect their information system. Thus, researching the technique to enhance the operating system security is critical to resolve the problem of information security.The LSACS system implements several security functions, especially implements the security function of access control. It provides several kinds of security service such as Identity Authentication, Access Control, Security Audit.Identity Authentication ensures that only the legal user can access system resource; Access Control determines whether a user can access some kinds of resource by a set of rules; Security Audit logs the event, which has relationship with security.This paper discusses how to build a security Linux operating system, emphasis on the system framework design and the key technical in the system. The content of this thesis include:1. Analysis the necessary of operating system security: Introduce the basic principle to build secure operating system. Introduce several security models. Introduce the process to develop a secure operating system based on Linux simply.2. Introduce the Linux operating system, including the component characteristic and objection. Introduce the Linux loadable kernel module, and how to use LKM to implement the security Linux operating system.3. Present several ways to implement LSACS. Introduce the architecture of LSACS. Introduce the component of the system and the relationship between them.4. Discuss the implement of secure service component in detail, including the data structure, the procedure to deal with the access request.5. Introduce the user configuration component, and the self protect component including data structure and the major procedure.
Keywords/Search Tags:linux system, security, data structure, LSACS, procedure
PDF Full Text Request
Related items