首页 | 本学科首页   官方微博 | 高级检索  
     

基于RBAC的信息终端内核模型
引用本文:李洪心,关可卿. 基于RBAC的信息终端内核模型[J]. 计算机科学, 2011, 38(11): 100-103
作者姓名:李洪心  关可卿
作者单位:东北财经大学管理科学与工程学院 大连116025
基金项目:本文受国家自然科学基金项目((71002094)资助。
摘    要:随着3G技术、无线网络等新兴技术的发展,桌面系统、嵌入式系统用作个人或企业用户的信息终端,数据的保密性将面临更严峻的安全威胁。为提高信息终端的安全性,分析了操作系统中进程的非法操作对系统信息安全产生的威胁,将RI3AC模型应用于信息终端中操作系统内核的安全管理机制中,构建了基于RI3AC的系统进程访问控制模型,给出了具体的实现框架,并针对开源操作系统与非开源操作系统,分别给出了实施方法。

关 键 词:RBAC,访问控制,操作系统内核,数据安全

Model of Information Terminal's Kernel Based on RBAC
LI Hong-xin,GUAN Ke-qing. Model of Information Terminal's Kernel Based on RBAC[J]. Computer Science, 2011, 38(11): 100-103
Authors:LI Hong-xin  GUAN Ke-qing
Affiliation:(School of Management Science and Engineering,Dongbei University of Financial and Economics,Dalian 116025,China)
Abstract:With the development of such technologies as 3G and wireless network, desktop systems and embedded systerns are used as individual's or enterprise user's information terminals, and confidentiality of user's data will face more serious security threats than before. ho improve the security of information terminals, this paper analyzed the threats to system's information security which comes from the abnormal operation by processes in operation systems, and applied RBAC model into the safety management mechanism of operation system's kernel. The access control model of system's process based on RI3AC was built, and an implement framework was proposed. Finally, this paper illustrated the methods of implementation of the model for open source systems and non-open source systems.
Keywords:RBAC   Access control  Operation system kernel  Data security
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号