In this dissertation the integrated and privilege - role extended unix operating system security model , which is based on the blp model , is discussed 在對blp模型進行分析的基礎上,提出了以blp模型為基礎的完整性和特權(quán)角色擴展的unix操作系統(tǒng)安全模型。
Previously , he was involved in writing fiber channel device drivers and developing network processor applications , as well as maintaining unix operating systems 以前,他從事的是編寫光纖通道設備驅(qū)動程序和開發(fā)網(wǎng)絡處理器應用程序,以及維護unix操作系統(tǒng)。
It has been closely associated with the unix operating system where it was developed , since both the system and most of the programs that run on it are written in c 當它開發(fā)的時候是緊密的與unix系統(tǒng)結(jié)合在一起,直到系統(tǒng)和大多數(shù)在上面運行的程序都是用c寫的
More and more websphere applications are being migrated from a traditional unix operating system to linux for lower costs with similar performance 越來越多的websphere應用程序正在由傳統(tǒng)的unix os向linux遷移,因為這樣可以通過更少的費用而獲得近乎同樣的性能。
This dissertation is focus on the research of the model of secure operating system and the implementation architecture of the security policy on unix operating system platform 本文以unix操作系統(tǒng)為平臺,重點對安全操作系統(tǒng)模型和安全策略實現(xiàn)結(jié)構(gòu)進行了研究。
The berkeley software distribution family of operating systems can be traced back to the bsd unix operating system created and maintained at the university of california , berkeley , since the late 1970s Berkeley software distribution ( bsd )系列操作系統(tǒng)的歷史向前可以追溯到20世紀70年代后期由加利福尼亞大學berkeley創(chuàng)建和維護的bsd unix操作系統(tǒng)。
In addition , the logical partitioning lpar capability of pseries servers makes it possible to run one or more instances of linux along with aix , ibms award - winning unix operating system , on a singler server 另外, pseries服務器所具有的邏輯分區(qū)( lpar )能力使它可以在一臺服務器上在運行aix ( ibm獲獎的操作系統(tǒng))的同時,再運行一個或多個linux實例。
After the analysis of the typical instance of the security attack on the unix operating system , it can be concluded that the discretionary accessing mechanism and the implementation of the privileged super - user are both the source of the security problems of the unix 本文通過重點分析針對unix操作系統(tǒng)的一些攻擊實例,指出現(xiàn)有的unix操作系統(tǒng)自主訪問機制和超級用戶特權(quán)實現(xiàn)方式是最主要的安全問題。