Font Size: a A A

Embedded Operating System Information Security Of Nuclear Technology Research And Realization

Posted on:2005-11-20Degree:MasterType:Thesis
Country:ChinaCandidate:X YangFull Text:PDF
GTID:2208360125963994Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of computer technology and network, more and more embedded devices can communicate through Internet. Computing resource can be shared beyond the limit of time and space. Information security becomes more and more important. Due to operating system is the core of embedded system, if it is weak in security, the application system based on it and the security of the whole embedded systems will be not guaranteed. However, few works have been done in the field of embedded security operating system. Therefore, it is necessary for us to constructe the embedded operating system with high relibility and high security.The security mechanism and implementation method of operating system are researched in detail, and the security kernel is designed as the security management component of the embedded operating system according to the special requirement of the embedded system in this paper. To sum up, there are several innovative researches as follows:1. This paper researches the standard of security operating system, combines the features of the embedded system such as resource limit, presents B1 level embedded subset.2. This paper presents a multi-policies model supporting the MLS, RBAC, DTE according the multiformity of embedded application, and designs the multi-policy integrating language.3. According to the character of lacking multi-user interaction environment in the embedded system, this paper identifys the users in the policy configure tools. Meanwhile, the security kernel uses mandatory access control technique to isolate and check the security to all the system calls.4. To meet the 'small and concise' requirement for security kernel in embedded operating system, the security policies are put in policy database outside the security kernel, which isolated the policy and realization. In addition, this realization approach will facilitate the security policies to be dynamically replaced and downloaded on line, and to speed up the decision and optimize the system performance through adding access vector cache in security kernel.According to the above researches, this paper realizes the security kernel in the CRTOS II embedded operating system, and verifys the correctness of the function and performance of the security kernel architecture. About the security safeguard technologies of the embedded operating system are presented which could be regarded as the good reference.
Keywords/Search Tags:secure operating system, security kernel, mandatory access control, access vector cache, B1 level embedded subset
PDF Full Text Request
Related items