Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Design for Security Operating System

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Wenzheng Zhu ; Coll. of Comput., Konkuk Univ., Seoul ; Changhoon Lee

Users and resources in a system are defined subjects and objects separately and abstractly by a mandatory access control mechanism. Both subjects and objects are endowed with security levels. The computer's security on basis of the operating system, and the operating system is the basic software of a computer. We present a model of security operating system. As we know the operating system has many security disables. But after the research on current security of Linux OS, this paper using access controlling, auditing and LPT designs a generalized security operating system. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. And this model was able to satisfy the standard of security operating system.

Published in:

Modelling & Simulation, 2009. AMS '09. Third Asia International Conference on

Date of Conference:

25-29 May 2009