Skip to Main Content
Security policy was implemented by using a module in security kernel, and it was not benefit to change of security policy. Used threaded software architecture in security kernel of information security toolkit, used object technology to implement every sub-system, and objected the application which accessing information in security toolkit. Security kernel can not depend to exterior application, and has independence among the inside objects, convenient function to expand and maintain. Security kernel implement access control mechanisms which use RBAC as an object, it ensure the security of both the objected application and the interior information of toolkit.
Date of Conference: 23-25 Oct. 2009