首页    期刊浏览 2024年07月05日 星期五
登录注册

文章基本信息

  • 标题:An Integrity Protection Model based on Trusted Recovery Technology
  • 本地全文:下载
  • 作者:Xiaojie Xu ; Lisheng Wang
  • 期刊名称:International Journal of Security and Its Applications
  • 印刷版ISSN:1738-9976
  • 出版年度:2016
  • 卷号:10
  • 期号:4
  • 页码:167-178
  • DOI:10.14257/ijsia.2016.10.4.17
  • 出版社:SERSC
  • 摘要:This paper firstly through IBAC, integration of TE and RBAC, the use of compensatory well-formed transaction is proposed, the integrity of the structure can be recovered partial malicious transaction monitoring machine model. In the partial revocation of constitutive affairs, for the operation of data and tracking the affected, with two recovery policies. Conservative recovery policy to stop system the recovery of normal transaction execution, by analyzing log file dependencies list, according to operation performed after first order, cancel each affected operation. Another optimistic recovery policy can be in the normal operation of the system at the same time, the establishment of compensation operation corresponding to the operation to recover, and submitted to the monitoring machine scheduling integrity. This method can recover the system to a secure state in the face of failures and improves the availability of the system. It provides an important exploration for the design and implementation of the trusted recovery mechanisms of high-level secure operating system.
  • 关键词:Computer Security; Integrity Policy; Trusted Recovery; Access Control
国家哲学社会科学文献中心版权所有