%0 Journal Article
%T On Methodology of Modeling the Trust Base in Operating Systems
操作系统信任基建模的方法学研究
%A SHI Wen-chang
%A
石文昌
%J 计算机科学
%D 2010
%I
%X Advocates the philosophy that operating systems are of indispensable significance to make applications trusled. Elaborates the concept of Trust Base in Operating System (TBOS) with a focus on Web applications. Discusses research methods for modeling the TI30S with a longing for ensuring that the TBOS is trusted. Proposes the TBOS archilecture that consists of three main parts, which are the Trust Monitoring Core Engine, the In-Kernel Trust Monitor and the Out of-Kernel Trust Monitor. Proposes a research guideline that is to exploit the potential of hardware and reduce the size of software. States key issues and key technictues in modeling the TBOS. Establishes the methodology foundalion of modeling the TBOS from the aspects of model construction method, trust monitoring method, inter-domain collaboration method, protection-by-isolation method, hardware features abstraction method and software size minimization method.
%K Operating system
%K Trust base
%K Modeling
%K Methodology
%K Model
%K Hardware
操作系统
%K 信任基
%K 建模
%K 方法学
%K 模型
%K 硬件
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=E90240A6164B9E4EC77DF446B200C6F5&yid=140ECF96957D60B2&vid=42425781F0B1C26E&iid=DF92D298D3FF1E6E&sid=CA4FD0336C81A37A&eid=B31275AF3241DB2D&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=21