원문정보
초록
영어
This paper firstly through IBAC, integration of TE and RBAC, the use of compensatory well-formed transaction is proposed, the integrity of the structure can be recovered partial malicious transaction monitoring machine model. In the partial revocation of constitutive affairs, for the operation of data and tracking the affected, with two recovery policies. Conservative recovery policy to stop system the recovery of normal transaction execution, by analyzing log file dependencies list, according to operation performed after first order, cancel each affected operation. Another optimistic recovery policy can be in the normal operation of the system at the same time, the establishment of compensation operation corresponding to the operation to recover, and submitted to the monitoring machine scheduling integrity. This method can recover the system to a secure state in the face of failures and improves the availability of the system. It provides an important exploration for the design and implementation of the trusted recovery mechanisms of high-level secure operating system.
목차
1. Introduction
2 Preliminaries
2.1 CW Model
2.2 PCW Model
2.3 Recoverable Integrity Monitoring Model
3 A Integrity Recovery Algorithm for Malicious Partially Transaction
3.1 Operation Event, Log and Dependency
3.2 Recovery Policy and Algorithms
4. Restore Examples and System Design and Implementation
Conclusion
Acknowledgements
References