计算机科学 ›› 2010, Vol. 37 ›› Issue (7): 1-6.

• 综述 •    下一篇

操作系统信任基建模的方法学研究

石文昌   

  1. (中国人民大学数据工程与知识工程教育部重点实验室 北京100872);(中国人民大学信息学院 北京100872)
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家863计划课题(2007AA01Z414),国家自然科学基金项目(60873213,60703103),北京市自然科学基金项目(4082018),上海市智能信息处理重点实验室开放课题((IIPL-09-006)资助。

On Methodology of Modeling the Trust Base in Operating Systems

SHI Wen-chang   

  • Online:2018-12-01 Published:2018-12-01

摘要: 倡导操作系统在确立应用系统的可信性中具有不可或缺的作用之理念,以Web应用为聚焦点,诊释操作系统信任基(TBOS)的思想。以如何确保TBOS的可信性为主线,讨论TBOS建模的研究方法。提出由信任监控核心引擎、内核信任监控器和核外信任监控器三大部分组成的TBOS体系结构,提出发挥硬件效能与缩小软件尺寸相结合的研究方针,阐述TBOS建模中的关键问题和关键技术,从模型构造方法、信任监控方法、域间协同方法、隔离保护方法、硬件特性抽象方法和软件尺寸缩减方法等方面建立TBOS建模的方法学基础。

关键词: 操作系统,信任基,建模,方法学,模型,硬件

Abstract: Advocates the philosophy that operating systems are of indispensable significance to make applications trusled. Elaborates the concept of Trust Base in Operating System (TBOS) with a focus on Web applications. Discusses research methods for modeling the TI30S with a longing for ensuring that the TBOS is trusted. Proposes the TBOS archilecture that consists of three main parts, which are the Trust Monitoring Core Engine, the In-Kernel Trust Monitor and the Out of-Kernel Trust Monitor. Proposes a research guideline that is to exploit the potential of hardware and reduce the size of software. States key issues and key technictues in modeling the TBOS. Establishes the methodology foundalion of modeling the TBOS from the aspects of model construction method, trust monitoring method, inter-domain collaboration method, protection-by-isolation method, hardware features abstraction method and software size minimization method.

Key words: Operating system, Trust base, Modeling, Methodology, Model, Hardware

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!