Font Size: a A A

Linux Security-enhanced Technology Research And Realization

Posted on:2003-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:Y H YinFull Text:PDF
GTID:2208360062450139Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Along with the development of science and economy, information technology affects people increasingly. The development of Internet makes the application of computer became widespread. But the security problem becomes more and more important at the same time.The infonnation security means the technical which is used to secure the information system and protect the information from changing% leaking or destroying by a man without proper authorizatioit The operating system security including Identity Authentication~ Access Control~ Security Audlt~ encrypt and decrypt~ Role based access control and etc,is the kernel of information securityIn fact, the computer users including person users and corporation users have not enough professional knowledge to protect their information systent Thus, researching the technique to enhance the operating system security is critical to resolve the problem of information security.The LSACS system implements several security functions, especially implements the security function of access control. It provides several kinds of security service such as Identity Authentication~ Access Control~ Security Audit.Identity Authentication ensures that only the legal user can access system resource; Access Control determines whether a user can access some kinds of resource by a set of rules; Security Audit logs the event, which has relationship with securityThis paper discusses how to build a security Linux operating system, emphasis on the system framework design and the key technical in the system. The content of this thesis include:1.Analysis the necessaiy of operating system security: Introduce the basic principle to build secure operating system. Introduce several security models. Introduce the process to develop a secure operating system based on Linux simply2.Introduce the Linux operating system, including the component~ characteristic and objection. Introduce the Linux loadable kernel module, and how to use LKM to implement the security Linux operating system.3.Present several ways to implement LSACS. Introduce the architecture of LSACS. Introduce the component of the system and the relationship between them.4.Discuss the implement of secure service component in detail, including the data structure, the procedure to deal with the access request5.Introduce the user configuration component, and the self protect component including data structure and the major procedure.
Keywords/Search Tags:Security-enhanced
PDF Full Text Request
Related items