Computer Science ›› 2013, Vol. 40 ›› Issue (Z6): 320-322.

Previous Articles     Next Articles

Research on Secure Access Control Mechanism Based on Secure Domain Separation for Embedded Systems

NIU Wen-sheng,LI Ya-hui and ZHANG Ya-di   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Based on secure domain separation model,the research in secure architectures of embedded systems proposed a method of the secure access control,which supports multi-level secure separation of information stream with the message router between partions and messages authority based on the secure partition kernels.In order to implement the multi-level security embedded operating system,the structure of the secure access control mechanism was presented according to the secure domain separation model.The security analysis results prove that the proposed method can keep from security threats includeing illegal resource accessing,identity personation,information revealing and cover channel etc.The perfangmance analysis results show that the synthetical comsuming is about 10% with importing the security access control mechannism.

Key words: Multi-level security,Mandatory access control,Space separation,Security monitor

[1] Alves-Foss J,Taylor C,Oman P.A Multi-layered Approach to Security in High Assurance Systems[C]∥Proceedings of the Hawaii International Conference on System Sciences.January 2004
[2] Rushby J M.The Design and Verification of Secure Systems[J].ACM Operating Systems Review,1981,15(5):12-21
[3] Rushby J M.Proof of Separability:A Verification Technique for a Class of Security Kernels[J].Computer Science,1982,137:352-367
[4] Boettcher C,Rushby J.The MILS component integration ap-proach to secure information sharing[C]∥the 27th Digital A-vionics Systems Conference.October 2008:26-30
[5] 黄玉琪,张建平,马利.基于三权分立原则的安全操作系统结构设计[J].计算机应用与软件,2010,27(8):159-162
[6] 韩立毛,赵跃华,马祥顺.嵌入式操作系统的内核安全研究与设计[J].计算机工程与设计,2010,31(14):3233-3236
[7] Bell D,LaPadula L.Secure Computer Systems:a Mathematical Model[R].Technical Report MTR-2547(Vol.II).MITRE Corp.,Bedford,MA,May 1973
[8] Brien R O,Rogers C.Developing application on LOCK[C]∥Proceedings of Symposium Research in Security and Privacy.Oct 1991:206-214

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!