{"title":"Researches on the Security Protection and Inspection Method for Confidential Documents Based on Linux Operating System","authors":"Changqi Hu, Fei Chen, Hua Zheng","doi":"10.1145/3310986.3311029","DOIUrl":null,"url":null,"abstract":"With the increasing usage of electronic confidential documents on Linux operating systems, the caused potential threats are becoming more and more serious, because of the lack of relevant mature security management software for Linux operating system. In this paper, a related document monitoring strategies based on virtual file system (VFS) is studied. Then the common file search methods and string matching methods are summarized for the security inspection of the confidential computer running the Linux operating system. The study of this paper has important engineering value for improving the effect of the confidential computer security management work in the future.","PeriodicalId":252781,"journal":{"name":"Proceedings of the 3rd International Conference on Machine Learning and Soft Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Machine Learning and Soft Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3310986.3311029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
With the increasing usage of electronic confidential documents on Linux operating systems, the caused potential threats are becoming more and more serious, because of the lack of relevant mature security management software for Linux operating system. In this paper, a related document monitoring strategies based on virtual file system (VFS) is studied. Then the common file search methods and string matching methods are summarized for the security inspection of the confidential computer running the Linux operating system. The study of this paper has important engineering value for improving the effect of the confidential computer security management work in the future.