%0 Journal Article
%T Trusted Recovery Based on Security Compromises Analysis in Secure Operating System
安全操作系统中基于安全性损害分析的可信恢复
%A LI Song-Lin
%A YUAN Chun-Yang
%A ZHU Ji-Feng
%A HUAI Xiao-Yong
%A LIANG Hong-Liang
%A HE Ye-Ping
%A
李松林
%A 袁春阳
%A 朱继峰
%A 淮晓永
%A 梁洪亮
%A 贺也平
%J 计算机科学
%D 2007
%I
%X Failures or discontinuities in secure operating systems may be inevitable because of internal or external reasons, and then security compromises. First, a common security model is given out in this paper. Then it is extended to in clude security compromises. And it is suggested to detect security compromises by analyzing security audit log. At last, trusted recovery algorithms is argued how to guarantee security in secure operating systems. Aparting from passire defenses, works in this paper guarantee security forwardly, and promote reliability and recoverability of secure operating systems.
%K Security compromise
%K Trusted recovery
%K Confidentiality
%K Integrity
%K Secure operating system
安全性损害
%K 可信恢复
%K 机密性
%K 完整性
%K 安全操作系统
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=4B110DA19736EAC1AA3AE66E71B5F6A9&yid=A732AF04DDA03BB3&vid=339D79302DF62549&iid=0B39A22176CE99FB&sid=7ABC4505E3960D2B&eid=4FE459D71E3BF8EB&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=12