According to trusted compeer seeffiity evaluation standard ( tgskt ) , tfae security level of ^ armostall dbms is c2 , and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource 按照可信計算機評估標準tcsec看,當(dāng)前多數(shù)dbms系統(tǒng)只具備c2級安全性,這種安全性對數(shù)據(jù)的保護是不夠的。提供一個可靠的mlsdbms系統(tǒng)來保護系統(tǒng)信息資源是必要的,迫切的。
This thesis researchs the correlative security evaluation criteria and analyses in detail linux kernel at first . linux kernel is improved at four aspects : access control list , capability , system audit , mandatory access control , based on linux kernel 2 . 4 . 4 on tcsec and the security level of linux is enhanced from cl to bl 本論文首先研究了相關(guān)的安全評估標準,并對linux內(nèi)核進行了詳細地分析,然后以tcsec為標準,基于linux內(nèi)核2 . 4 . 4 ,分別從訪問控制表、權(quán)能、系統(tǒng)審計以及強制訪問控制四個方面時linux內(nèi)核進行了改進,使linux的安個級別從c1級提高到了b1級。
So the evaluation and certification on information security is a fundmental research area . since us dod developed tcsec in 1985 , the security community in the world has made great progress and at last developed cc ( common criteria ) which latter was publicized as international standard 國際社會中,自從1985年美國國防部發(fā)布了tcsec (可信計算機系統(tǒng)評估準則)以來,歷經(jīng)十余年的發(fā)展,已經(jīng)制定了得到廣泛認可的cc ( it安全通用評估準則) ,并將其作為國際標準發(fā)布。
The conc9pts and approaches relating to information security among the course of development of the ia are introduced . for example , reference monitor ( are ) , reference validation mechanism ( rvm ) , trusted computing base ( tcb ) , security model , tcsec , cc , iatf fritsa , etc . chapter 2 analyzes the time and space property " of information security 第一章對信息保障的歷史進行回顧,介紹在信息保障的發(fā)展歷程中有關(guān)信息安全的概念和方法,如:引用監(jiān)視器( rm ) 、引用確認機制( rvn ) 、可信計算基( tcb ) 、安全模型、 tcsec 、 cc 、 iatf 、 fritsa等。
After intruducing the security demand from the computer area , this paper present the designing aim of the real time audit analysis system ( raas ) , considering the trusted computer system evaluation criteria ( tcsec ) of us dod and common criteria for it security evaluation ( cc ) 本文首先介紹了計算機領(lǐng)域的安全需求,根據(jù)美國國防部的可信計算機評測標準( tcsec )和計算機信息系統(tǒng)的通用安全評價準則( commoncriteriaforitsecurityevaluation , cc )中提出的安全操作系統(tǒng)的審計標準,提出本系統(tǒng)的設(shè)計目的。
So the souece code of postgresql - a kind of free software dbms and its security capability are analyzed firstly , and then based on the carefully analyzing of tcsec & tdi ' s requirements and present mls dbms ' s architecture , technical scheme to retrofit postgresql to a b1 - level mls dbms is given , which including security subsystem and audit subsystem . then some revellent machanism and policy about security label and mac are discueesd 本文分析可信任計算機系統(tǒng)評價準則和可信數(shù)據(jù)庫系統(tǒng)解釋的具體要求,對linux環(huán)境下的免費數(shù)據(jù)庫系統(tǒng)postgresql的源代碼和各種功能進行了初步分析,確定了基于postgresql的b1級安全數(shù)據(jù)庫系統(tǒng)的技術(shù)選擇及系統(tǒng)結(jié)構(gòu),提出了安全子系統(tǒng)、審計子系統(tǒng)的總體設(shè)計方案,并對設(shè)計方案中的安全標示和強制訪問控制的相關(guān)機制和處理策略進行了分析及論述。
It researches the common evaluation criteria of tcsec , itsec and cc in the world , at the same time it points out their disadvantages . it also introduces the situation of evaluation criteria in our country and compares cc with system evaluation . at last it points out to develop a common evaluation criteria for system evaluation is a difficult task 研究了國際上通用的測評標準: tcsec , itsec和cc ,分析指出了它們的不足,同時也介紹了我國測評標準的發(fā)展情況,將cc同系統(tǒng)測評做了一個簡單的比較,指出今后制定一部通用的針對系統(tǒng)評估的測評標準的艱巨性。
Other Languages
"tcsec" meaning: [Defence]trusted computer system evaluation criteria
What is the meaning of tcsec in Chinese and how to say tcsec in Chinese? tcsec Chinese meaning, tcsec的中文,tcsec的中文,tcsec的中文,translation, pronunciation, synonyms and example sentences are provided by ichacha.net.