design of secure operating system 中文意思是什麼

design of secure operating system 解釋
安全操作系統的設計
  • design : vt 1 計劃,企圖,立意要…。2 指定,預定;留給,留著。3 設計,草擬,擬定,籌劃;起草,畫草圖,打(...
  • of : OF =Old French 古法語。
  • secure : adj ( curer; curest)1 安心的;不必擔心的;有把握的。 2 可靠的。3 安全的。4 堅固的;牢固的。5 必...
  • operating : adj 1 運行的;操作的;工作的。2 關于業務的;營業上的;關于收支的。operating expenses 業務開支;營...
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. Besides, to enforce the security of authentication process, in this thesis we propose the design and implementation of a passwd checker and mandatary identification and authentication mechanism in ercist 4. 0 secure operating system

    本文還介紹了安勝4 . 0安全操作系統中口令檢查器和強身份認證機制的設計和實現,以增強鑒別過程的安全性。
  2. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  3. On the operating design of raas, the paper focused on the change of task _ struct, the design of kernel process kaasd, the timing of raas, the configuration and initialization of raas in the end, the paper evaluate the raas from the aim of system design, the integration with the other secure components of secure os, provide some problems unsolved, such as the expanding to network monitor, the new technology of ids

    對于實時審計分析系統的整體運行設計,從操作系統原有數據結構task _ struct的改變,內核進程kaasd的設計, raas的定時和系統的配置和初始化這幾個方面逐個進行敘述。在本文的最後,從raas的達到的目的,與原有安全功能的有效合成等方面對該系統作了一個評價,同時提出幾個需要進一步思考的問題,如對網路的擴展,對入侵檢測新技術的引入等
  4. Linux has been more and more widely used today, but the secure degree of linux is low, so in this paper, we produce a linux - compatible secure operating system, named slinux. its design object is in accordance with the requirements of the fourth level, i. e. structured protection level, of gb17859. for this purpose, we introduce such mechanism, as identification & authentication, mac, least privilege manage, trusted path, password management. object reuse, covert and channel analysis. furthermore, we have some innovation, introduce the mechanism of network security and audit

    本論文的研究目的是對linux進行安全增強,設計一個新的安全操作系統,即slinux安全操作系統,其設計目標是滿足gb17859第四級《結構化保護級》的需求,為此我們在原有linux操作系統的基礎上引入了標識與鑒別機制, mac機制,最小特權管理機制,可信通路機制,密碼處理機制,客體重用機制以及隱通道分析機制,同時還進行了創新,引入了網路安全保護機制和審計機制。
  5. Sixth, we introduce some helpful investigations about some key technologies of high level secure operating system design, such as covert channel analysis and trusted path, and describe their coarse - gained implementation in the real system

    第六,對高等級安全操作系統設計的其它幾個關鍵問題,包括隱蔽通道分析處理、可信路徑等做了有益的探索,給出了其在系統中實現的大致方案。
  6. Daacm is conformant to the requirements of the secure operating system design of structured protection level, and will be used to the practical system design

    Daacm符合論文中給出的《結構化保護級》安全操作系統設計的需要,並將實際應用於該系統的設計之中。
分享友人