{"title":"安全操作系统设计","authors":"Wenzheng Zhu, Changhoon Lee","doi":"10.1109/AMS.2009.109","DOIUrl":null,"url":null,"abstract":"Users and resources in a system are defined subjects and objects separately and abstractly by a mandatory access control mechanism. Both subjects and objects are endowed with security levels. The computer′s security on basis of the operating system, and the operating system is the basic software of a computer. We present a model of security operating system. As we know the operating system has many security disables. But after the research on current security of Linux OS, this paper using access controlling, auditing and LPT designs a generalized security operating system. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. And this model was able to satisfy the standard of security operating system.","PeriodicalId":6461,"journal":{"name":"2009 Third Asia International Conference on Modelling & Simulation","volume":"1 1","pages":"667-670"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Design for Security Operating System\",\"authors\":\"Wenzheng Zhu, Changhoon Lee\",\"doi\":\"10.1109/AMS.2009.109\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Users and resources in a system are defined subjects and objects separately and abstractly by a mandatory access control mechanism. Both subjects and objects are endowed with security levels. The computer′s security on basis of the operating system, and the operating system is the basic software of a computer. We present a model of security operating system. As we know the operating system has many security disables. But after the research on current security of Linux OS, this paper using access controlling, auditing and LPT designs a generalized security operating system. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. And this model was able to satisfy the standard of security operating system.\",\"PeriodicalId\":6461,\"journal\":{\"name\":\"2009 Third Asia International Conference on Modelling & Simulation\",\"volume\":\"1 1\",\"pages\":\"667-670\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-05-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Third Asia International Conference on Modelling & Simulation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AMS.2009.109\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Third Asia International Conference on Modelling & Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AMS.2009.109","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Users and resources in a system are defined subjects and objects separately and abstractly by a mandatory access control mechanism. Both subjects and objects are endowed with security levels. The computer′s security on basis of the operating system, and the operating system is the basic software of a computer. We present a model of security operating system. As we know the operating system has many security disables. But after the research on current security of Linux OS, this paper using access controlling, auditing and LPT designs a generalized security operating system. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. And this model was able to satisfy the standard of security operating system.