earticle

논문검색

An Integrity Protection Model based on Trusted Recovery Technology

원문정보

초록

영어

This paper firstly through IBAC, integration of TE and RBAC, the use of compensatory well-formed transaction is proposed, the integrity of the structure can be recovered partial malicious transaction monitoring machine model. In the partial revocation of constitutive affairs, for the operation of data and tracking the affected, with two recovery policies. Conservative recovery policy to stop system the recovery of normal transaction execution, by analyzing log file dependencies list, according to operation performed after first order, cancel each affected operation. Another optimistic recovery policy can be in the normal operation of the system at the same time, the establishment of compensation operation corresponding to the operation to recover, and submitted to the monitoring machine scheduling integrity. This method can recover the system to a secure state in the face of failures and improves the availability of the system. It provides an important exploration for the design and implementation of the trusted recovery mechanisms of high-level secure operating system.

목차

Abstract
 1. Introduction
 2 Preliminaries
  2.1 CW Model
  2.2 PCW Model
  2.3 Recoverable Integrity Monitoring Model
 3 A Integrity Recovery Algorithm for Malicious Partially Transaction
  3.1 Operation Event, Log and Dependency
  3.2 Recovery Policy and Algorithms
 4. Restore Examples and System Design and Implementation
 Conclusion
 Acknowledgements
 References

저자정보

  • Xiaojie Xu School of Electronics and Information,Tongji University,Shanghai,China, Network Center,Shanghai Normal University Tianhua College,Shanghai,China
  • lisheng Wang School of Electronics and Information,Tongji University,Shanghai,China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.