Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2004-01
Add to Favorite Get Latest Update

Implementation of Security Access Control Based on LSM

RUAN Yue,WANG Chengyao (Computer Department, Beijing University of Science and Technology , Beijing 100 083)  
The Linux security modules(LSM),which is proposed by Linus Torvalds ,is a general access control framework supporting variant security policies for the Linux kernel.The fine grained discretionary access control(DAC) and the mand atory access control(MAC) are necessary to security operation system. The paper describes the framework and the design of the LSM,and also discusses the impleme ntation of the fine grained DAC and the MAC based on it.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 Dong Jingxiang Bai Yingcai (College of Information Security Engineering,Shanghai Jiaotong Uniuversity,Shanghai 200030,China);DESIGN OF A GUARD BOX BASED INTRUSION PROOF SYSTEM[J];Computer Applications and Software;2006-01
Chinese Journal Full-text Database 10 Hits
1 WANG Yue, YU Shu-ju College of Computer Science, Beijing University of Technology, Beijing 100022, China;The Method of Real-time Monitoring the LINUX File System[J];Journal of Beijing Polytechnic University;2004-04
2 Xia Li (Naval University Of Engineering Engineering Design Institute of Navy, Beijing,100000 P.R.China);The Analysis of Linux Current Security Technique[J];Network & Computer Security;2007-07
3 WU Ji-ke, LING Jie (Faculty of Computer, Guangdong University of Technology, Guangzhou 510090, China);The Principle of Buffer Overflow Attack[J];Journal of Guangdong University of Technology;2003-02
4 Zi Xiaochao, Yao Lihong, Zeng Qingkai, Mao Bing, Xie Li (State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing 210093);A Survey of Security-Enhanced Techniques for Operating Systems[J];High Technology Letters;2003-07
5 XU Wen bo, LEI Tao (College of Information Technology, Southern Yangtze University, Wuxi 214036, China);Study and implementation of security system on Linux-host[J];Information Technology;2003-07
6 JIANG Yan~1,YAO Yan-ru~2(1.Computer & Control College,Harbin Univ.Sci.Tech.,Harbin 150080,China;2.Heilongjiang Credit Information Centre,Harbin 150001,China);Study and realization of network intrusion detective system on Linux[J];Information Technology;2006-01
7 ZHANG Tao~(1,2), WANG Jin-shuang~2, SHEN Jian~2, WU Bo~2 (1.Department of Computer Science of Nanjing University, Nanjing 210093, China; 2.Institute of Command Automation, PLA Univ. of Sci. & Tech., Nanjing 210007, China);Technology of Developing Security-enhanced Linux Based on Framework[J];Journal of PLA University of Science and Technology(Natural Science);2004-03
8 SHI Wen Chang, SUN Yu Fang, LIANG Hong Liang, ZHANG Xiang Feng, ZHAO Qing Song, and SHAN Zhi Yong (Institute of Software, Chinese Academy of Sciences, Beijing 100080) (Redflag Software Corporation Limited, Beijing 100080);DESIGN AND IMPLEMENTATION OF SECURE LINUX KERNEL SECURITY FUNCTIONS[J];Journal of Computer Research and Development;2001-10
9 SHAN Zhi Yong and SUN Yu Fang (Institute of Software, Chinese Academy of Sciences, Beijing 100080);A STUDY OF SECURITY ATTRIBUTES IMMEDIATE REVOCATION IN SECURE OS[J];Journal of Computer Research and Development;2002-12
10 SHAN Zhi Yong and SUN Yu Fang (Institute of Software, Chinese Academy of Sciences, Beijing 100080);A Study of Extending Generalized Framework for Access Control[J];Journal of Computer Research and Development;2003-02
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved