首页> 外文会议>International Conference for Young Computer Scientist >IMPLEMENTATION OF AUDIT IN SECURE OPERATING SYSTEM BASED ON CC
【24h】

IMPLEMENTATION OF AUDIT IN SECURE OPERATING SYSTEM BASED ON CC

机译:基于CC的安全操作系统审计实施

获取原文

摘要

It is very important for a secure operating system to detect potential attack and security breach. The audit subsystem of a computing system can collect many kinds of events in the system and can hence help to decide if a user ever tried to violate the security policies enforced in the system and therefor make users be accountable for their actions. Many secure operating systems implement audit subsystem in their own way. The common criteria for IT security evaluation (CC) provides the functional requirements for audit in its part 2. In this paper we suggest some methods to meet these requirements. Some of the methods have been used in our secure Linux system.
机译:安全操作系统来检测潜在的攻击和安全漏洞非常重要。计算系统的审计子系统可以收集系统中的许多事件,因此可以帮助决定用户是否尝试违反系统中强制执行的安全策略,并制作用户对其操作负责。许多安全操作系统以自己的方式实现审计子系统。 IT安全评估(CC)的常见标准为其第2部分提供了审计的功能要求。在本文中,我们建议一些方法以满足这些要求。我们的安全Linux系统中使用了一些方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号