当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Operating System Security (Synthesis Lectures on Information Security, Privacy,

Operating System Security (Synthesis Lectures on Information Security, Privacy,

书名:Operating System Security (Synthesis Lectures on Information Security, Privacy,

上传:石头

时间:2009-12-26

文件大小:1.55 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Trent Jaeger
出版日期:October 16, 2008
出版社:其它
页数:220
ISBN:ISBN-10: 1598292129 ISBN-13: 978-1598292121
文件格式:PDF

Operating systems provide the fundamental mechanisms for securingcomputer processing. Since the 1960s, operating systems designers haveexplored how to build “secure” operating systems – operating systemswhose mechanisms protect the system against a motivated adversary.Recently, the importance of ensuring such security has become amainstream issue for all operating systems. In this book, we examinepast research that outlines the requirements for a secure operatingsystem and research that implements example systems that aim for suchrequirements. For system designs that aimed to satisfy theserequirements, we see that the complexity of software systems oftenresults in implementation challenges that we are still exploring tothis day. However, if a system design does not aim for achieving thesecure operating system requirements, then its security features failto protect the system in a myriad of ways. We also study systems thathave been retrofit with secure operating system features after aninitial deployment. In all cases, the conflict between function on onehand and security on the other leads to difficult choices and thepotential for unwise compromises. From this book, we hope that systemsdesigners and implementors will learn the requirements for operatingsystems that effectively enforce security and will better understandhow to manage the balance between function and security.
Tags:InformationPrivacySecuritySynthesisTrust


相关书籍

  • Security in Wireless Mesh Networks (PDF英文版)
  • Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
  • Web 2.0 Security – Defending AJAX, RIA, AND SOA
  • Managing the Human Factor in Information Security: How to win over staff and inf
  • IBM DB2 Information Integrator 开发包装器的 C++ API 参考

评论 (1) 1 All

登陆 | 还没注册?