Constructing method for trusted application environment based on mandatory access control technology
A technology for mandatory access control and construction methods, which is applied in the fields of instruments, electrical digital data processing, platform integrity maintenance, etc., to prevent malicious interference and ensure the isolation of space.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] Such as Figure 1-2As shown, the technical solution realized by the present invention is characterized in that, according to the dependencies between application installation software packages, the software packages are marked securely by using specific marking rules, and the combination of mandatory access control mechanism and trusted computing technology is used to achieve The strict isolation between applications in time and space limits the range of system resources used by applications, reduces or shields unexpected interference between applications, and establishes a safe and reliable application environment for users.
[0032] Take Debian 5.0, a distribution version of Linux, as an example. This version provides a basic system and a large number of software packages in .deb format. These packages provide a list of other software packages that the normal installation of this package depends on. During the installation process of the system, the apt-get command ca...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 