ACCESS Linux operating system key technology research
|School||Harbin Institute of Technology|
|Course||Computer Science and Technology|
|Keywords||Trusted Computing Linux Credible start Security|
Trusted Computing Platform is a new research direction , the trusted computing has become a hot research . As the core of trusted computing platform , operating system requirements for credible self-evident. As open-source Linux, which is characterized by very suitable for trusted computing platform operating system, but the existing Linux operating system can not meet the high requirements of trusted computing platform . How to design a credible Linux operating system, will be the key to achieve trusted computing platform . In this paper, the existing Linux operating system , based on various attributes from a credible study focused on reliability, fault tolerance and security of the Linux operating system on how to improve the reliability , fault tolerance , and security is given the popular methods and models . The credibility of the operating system start-up is a very important issue , the paper by changing the existing Grub boot process , get a credible implementation of the Linux Grub credible start, the experiment shows that an increase of only 9% of the time the system overhead. Credible research on the basis of each attribute , defined the trusted operating system design principles , analyzes the trusted operating system's security features, designed to secure the overall framework of the Linux operating system . In achieving credible start on the Linux operating system , referring to China's national standard GB17859-1999 \, designed and implemented to achieve an access access control, audit and other functions, with security of the Linux operating system.