|
English
|
正體中文
|
简体中文
|
全文筆數/總筆數 : 80990/80990 (100%)
造訪人次 : 42717531
線上人數 : 1472
|
|
|
資料載入中.....
|
請使用永久網址來引用或連結此文件:
http://ir.lib.ncu.edu.tw/handle/987654321/85046
|
題名: | BAESGP:A Bottom-up Approach to Enable SELinux and Generate Policies for Unknown Linux Distributions |
作者: | 王禹軒;Wang, Yu-Hsuan |
貢獻者: | 資訊工程學系 |
關鍵詞: | 系統安全;存取控制;安全增強式 Linux;system security;Access Control;SELinux |
日期: | 2020-11-13 |
上傳時間: | 2021-03-18 17:28:52 (UTC+8) |
出版者: | 國立中央大學 |
摘要: | 處在資訊科技的社會中,隨處可見的科技產品皆為一個資訊系統,負 責處理成千上萬的資訊,資訊安全領域中強調透過安全防護技術達成資訊 的機密性 (Confidentiality)、整體性 (Integrity) 和可用性 (Availability)。 在市場中存在著諸多的設備,又有多少設備在運行時可以達到上述的安 全需求,國際標準中有提到存取控制對於達成上述安全需求扮演著重要 的角色,論文中以存取控制為主軸思考輔以 SELinux 為實際技術展示, 講解並分析如何透過存取控制達成資訊的機密性 (Confidentiality)、整體 性 (Integrity) 和可用性 (Availability)。本篇論文的目的及動機為幫助開 發者了解存取控制並且有足夠能力從頭開始在一個新的系統環境上部署 SELinux,並且解析如何能夠在有限度的假設之下自動產生 SELinux 政 策與其所遭遇的困難。;Nowadays, The concept of Access Control exists everywhere in our daily life and can protect our asset from unauthorized use, for example us- ing badge to enter the company entrance gate or card key when you back to home. In the area of Information Security, Access Control, a part of Risk Management, is used to keep confidentiality, integrity and availabil- ity of information, which are usually called CIA triad, from unauthorized disclosure, disruption and access. Access to protected information must be restricted to people who are authorized to access the information. The computer programs, and in many cases the computers that process the information, must also be authorized. This requires that mechanisms are in place to control the access to protected information according to Access Control procedures or policies specified by Administrator. Essentially, the core of Access Control, procedures or policies are implemented to make the mechanism know how to ensure which subject is authorized to access what object within the organizations. The hardest part of Access Control is to create a suitable policy which can not restrict too strict or loose. SELinux is prevalently applied to cloud server and embedded system, but seldom people really know how to configure SELinux or correctly enable SELinux on their system. With the regulation and law progressing, vendors is asked to protect their devices with Access Control. However, there are less pa- pers describing how to apply SELinux on the system in technical detail. Hence, this paper is managed to help people enable and configure SELinux on their system step by step. |
顯示於類別: | [資訊工程研究所] 博碩士論文
|
文件中的檔案:
檔案 |
描述 |
大小 | 格式 | 瀏覽次數 |
index.html | | 0Kb | HTML | 109 | 檢視/開啟 |
|
在NCUIR中所有的資料項目都受到原著作權保護.
|
::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::