• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2014, Vol. 36 ›› Issue (05): 836-841.

• 论文 • 上一篇    下一篇

一种灵活的强制完整性访问控制策略

徐锋1,魏立峰2,张国印1   

  1. (1.哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150001;
    2.国防科学技术大学计算机学院,湖南 长沙 410073)
  • 收稿日期:2013-08-02 修回日期:2014-01-20 出版日期:2014-05-25 发布日期:2014-05-25
  • 基金资助:

    信息保障技术重点实验室开放基金资助项目(KJ13105)

A flexible mandatory integrity access control policy               

XU Feng1,WEI Lifeng2,ZHANG Guoyin1   

  1. (1.College of Computer Science and Technology,Harbin Engineering University,Harbin 150001;
    2.College of Computer,National University of Defense Technology,Changsha 410073,China)
  • Received:2013-08-02 Revised:2014-01-20 Online:2014-05-25 Published:2014-05-25

摘要:

完整性保护是计算机安全的一项重要内容,虽然绝大多数安全操作系统都设计实现了完整性保护机制,但仍存在着系统的完整性被破坏以及完整性策略不够灵活的不足。在实施完整性保护的基本原则下,提出了一种灵活的完整性访问控制策略FIC,并给出了在LSM框架下的实现过程。FIC定义了主完整级和辅助完整级,通过访问控制规则、进程再标记规则和新建客体标记规则,实现了系统的完整性保护以及进程执行的灵活完整性保护控制。最后分析了实现效果,并指出了进一步可扩展性研究需求。

关键词: 完整性, 访问控制, 安全操作系统, LSM

Abstract:

Integrity protection is an important content of computer security. Most of security OSes supported integrity protection mechanism, but integrity also may be destructed, and the protection mechanism is not flexible enough. Based on the principle of integrity protection, FIC (Flexible Integrity Control) policy is proposed and implemented under LSM (Linux Security Module). Integrity level and integrity auxiliary level is defined, FIC defines many rules including access control rules, process relabel rules and new objects labeled rules, FIC policy can protect system's integrity and process execution's flexible integrity protection. Implementation effect is analyzed, scalable requirement is pointed out.
    

Key words: integrity;access control;security OS;Linux security module(LSM)