%0 Journal Article
%T Trusted objects in trusted operating system
可信操作系统中可信客体的研究
%A TAN Liang
%A
谭良
%J 计算机应用
%D 2008
%I
%X The object types in the operating system, which were sorted into the static object and the dynamic object, were analyzed, and some deficiencies in accessing the object in the security operating system were pointed out. Then, the concepts of the trusted static object, the trusted dynamic object and the trusted object were put forward, and the characteristics of the trusted object, the relationship between the secure object and the trusted object was addressed. Finally, some requirements for the trusted object, which needed to be resolved in the trusted operating system, were presented and discussed. All of these are the foundation for our future works.
%K security operating system
%K object
%K trusted operating system
%K trusted static object
%K trusted dynamic object
%K trusted object
安全操作系统
%K 客体
%K 可信操作系统
%K 可信静态客体
%K 可信动态客体
%K 可信客体
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=831E194C147C78FAAFCC50BC7ADD1732&aid=C195E95D964E41891E64547FF133FE3D&yid=67289AFF6305E306&vid=D3E34374A0D77D7F&iid=94C357A881DFC066&sid=2E45C5B3364EA9F3&eid=53A4507B400B4E65&journal_id=1001-9081&journal_name=计算机应用&referenced_num=0&reference_num=25