Computer Science ›› 2011, Vol. 38 ›› Issue (11): 100-103.
Previous Articles Next Articles
LI Hong-xin,GUAN Ke-qing
Online:
Published:
Abstract: With the development of such technologies as 3G and wireless network, desktop systems and embedded systerns are used as individual's or enterprise user's information terminals, and confidentiality of user's data will face more serious security threats than before. ho improve the security of information terminals, this paper analyzed the threats to system's information security which comes from the abnormal operation by processes in operation systems, and applied RBAC model into the safety management mechanism of operation system's kernel. The access control model of system's process based on RI3AC was built, and an implement framework was proposed. Finally, this paper illustrated the methods of implementation of the model for open source systems and non-open source systems.
Key words: RBAC, Access control,Operation system kernel,Data security
LI Hong-xin,GUAN Ke-qing. Model of Information Terminal's Kernel Based on RBAC[J].Computer Science, 2011, 38(11): 100-103.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2011/V38/I11/100
Cited