Linux内核安全机制的分析与研究

Gaoshou Zhai, Yaodong Li
{"title":"Linux内核安全机制的分析与研究","authors":"Gaoshou Zhai, Yaodong Li","doi":"10.1109/SECTECH.2008.17","DOIUrl":null,"url":null,"abstract":"It's very important to analyze and study security mechanisms provided by an operating system. Currently, Linux is becoming one of the most popular operating systems because of its excellent performance and open source philosophy. Since lots of individuals and enterprises are switching to Linux, access control mechanism of Linux has been improved from time to time for new security requirements. For instance, SELinux sub-system can enforce a policy based Mandatory Access Control (MAC) and provide flexible security policy configuration. However, there are still some defects in current Linux access control mechanism. In this paper, available Linux security mechanisms are analyzed at first, while permission division principle is summarized. Then a new MAC mechanism is devised based on some popular information security models such as RBAC, DTE and etc and it is characteristic of cross-layered permission assignment. Finally, a corresponding prototype system is implemented and further research directions are summarized.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Analysis and Study of Security Mechanisms inside Linux Kernel\",\"authors\":\"Gaoshou Zhai, Yaodong Li\",\"doi\":\"10.1109/SECTECH.2008.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It's very important to analyze and study security mechanisms provided by an operating system. Currently, Linux is becoming one of the most popular operating systems because of its excellent performance and open source philosophy. Since lots of individuals and enterprises are switching to Linux, access control mechanism of Linux has been improved from time to time for new security requirements. For instance, SELinux sub-system can enforce a policy based Mandatory Access Control (MAC) and provide flexible security policy configuration. However, there are still some defects in current Linux access control mechanism. In this paper, available Linux security mechanisms are analyzed at first, while permission division principle is summarized. Then a new MAC mechanism is devised based on some popular information security models such as RBAC, DTE and etc and it is characteristic of cross-layered permission assignment. Finally, a corresponding prototype system is implemented and further research directions are summarized.\",\"PeriodicalId\":377461,\"journal\":{\"name\":\"2008 International Conference on Security Technology\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECTECH.2008.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2008.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

分析和研究操作系统提供的安全机制非常重要。目前,Linux正成为最流行的操作系统之一,因为它具有出色的性能和开放源代码的理念。随着越来越多的个人和企业转向Linux, Linux的访问控制机制也在不断改进,以满足新的安全需求。例如,SELinux子系统可以实施基于策略的强制访问控制(Mandatory Access Control, MAC),并提供灵活的安全策略配置。但是,目前Linux的访问控制机制还存在一些缺陷。本文首先分析了现有的Linux安全机制,总结了权限划分原则。然后在RBAC、DTE等流行的信息安全模型的基础上设计了一种新的MAC机制,具有跨层权限分配的特点。最后,实现了相应的原型系统,并对进一步的研究方向进行了总结。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis and Study of Security Mechanisms inside Linux Kernel
It's very important to analyze and study security mechanisms provided by an operating system. Currently, Linux is becoming one of the most popular operating systems because of its excellent performance and open source philosophy. Since lots of individuals and enterprises are switching to Linux, access control mechanism of Linux has been improved from time to time for new security requirements. For instance, SELinux sub-system can enforce a policy based Mandatory Access Control (MAC) and provide flexible security policy configuration. However, there are still some defects in current Linux access control mechanism. In this paper, available Linux security mechanisms are analyzed at first, while permission division principle is summarized. Then a new MAC mechanism is devised based on some popular information security models such as RBAC, DTE and etc and it is characteristic of cross-layered permission assignment. Finally, a corresponding prototype system is implemented and further research directions are summarized.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信