In this dissertation the integrated and privilege - role extended unix operating system security model , which is based on the blp model , is discussed 在對(duì)blp模型進(jìn)行分析的基礎(chǔ)上,提出了以blp模型為基礎(chǔ)的完整性和特權(quán)角色擴(kuò)展的unix操作系統(tǒng)安全模型。
Previously , he was involved in writing fiber channel device drivers and developing network processor applications , as well as maintaining unix operating systems 以前,他從事的是編寫光纖通道設(shè)備驅(qū)動(dòng)程序和開發(fā)網(wǎng)絡(luò)處理器應(yīng)用程序,以及維護(hù)unix操作系統(tǒng)。
It has been closely associated with the unix operating system where it was developed , since both the system and most of the programs that run on it are written in c 當(dāng)它開發(fā)的時(shí)候是緊密的與unix系統(tǒng)結(jié)合在一起,直到系統(tǒng)和大多數(shù)在上面運(yùn)行的程序都是用c寫的
More and more websphere applications are being migrated from a traditional unix operating system to linux for lower costs with similar performance 越來(lái)越多的websphere應(yīng)用程序正在由傳統(tǒng)的unix os向linux遷移,因?yàn)檫@樣可以通過(guò)更少的費(fèi)用而獲得近乎同樣的性能。
This dissertation is focus on the research of the model of secure operating system and the implementation architecture of the security policy on unix operating system platform 本文以u(píng)nix操作系統(tǒng)為平臺(tái),重點(diǎn)對(duì)安全操作系統(tǒng)模型和安全策略實(shí)現(xiàn)結(jié)構(gòu)進(jìn)行了研究。
The berkeley software distribution family of operating systems can be traced back to the bsd unix operating system created and maintained at the university of california , berkeley , since the late 1970s Berkeley software distribution ( bsd )系列操作系統(tǒng)的歷史向前可以追溯到20世紀(jì)70年代后期由加利福尼亞大學(xué)berkeley創(chuàng)建和維護(hù)的bsd unix操作系統(tǒng)。
In addition , the logical partitioning lpar capability of pseries servers makes it possible to run one or more instances of linux along with aix , ibms award - winning unix operating system , on a singler server 另外, pseries服務(wù)器所具有的邏輯分區(qū)( lpar )能力使它可以在一臺(tái)服務(wù)器上在運(yùn)行aix ( ibm獲獎(jiǎng)的操作系統(tǒng))的同時(shí),再運(yùn)行一個(gè)或多個(gè)linux實(shí)例。
After the analysis of the typical instance of the security attack on the unix operating system , it can be concluded that the discretionary accessing mechanism and the implementation of the privileged super - user are both the source of the security problems of the unix 本文通過(guò)重點(diǎn)分析針對(duì)unix操作系統(tǒng)的一些攻擊實(shí)例,指出現(xiàn)有的unix操作系統(tǒng)自主訪問(wèn)機(jī)制和超級(jí)用戶特權(quán)實(shí)現(xiàn)方式是最主要的安全問(wèn)題。