CN102495989A - Subject-label-based access control method and system - Google Patents

Subject-label-based access control method and system Download PDF

Info

Publication number
CN102495989A
CN102495989A CN2011104324364A CN201110432436A CN102495989A CN 102495989 A CN102495989 A CN 102495989A CN 2011104324364 A CN2011104324364 A CN 2011104324364A CN 201110432436 A CN201110432436 A CN 201110432436A CN 102495989 A CN102495989 A CN 102495989A
Authority
CN
China
Prior art keywords
access control
request
module
access
main body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104324364A
Other languages
Chinese (zh)
Inventor
艾奇伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING NASE HENGXIN TECHNOLOGY CO LTD
Original Assignee
BEIJING NASE HENGXIN TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING NASE HENGXIN TECHNOLOGY CO LTD filed Critical BEIJING NASE HENGXIN TECHNOLOGY CO LTD
Priority to CN2011104324364A priority Critical patent/CN102495989A/en
Publication of CN102495989A publication Critical patent/CN102495989A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a subject-label-based access control method and a subject-label-based access control system. The method comprises the following steps of: setting a security label for a subject according to the characteristics of the system, setting an access request right list, and establishing a subject-label-based access control strategy library; intercepting an access request of the subject for an object in the system; performing security label detection on the subject transmitting the access request; and judging whether current operation is allowed or not, releasing the current request if the current operation is allowed, and on the contrary, refusing the request. The system comprises an interception and filtration module, an access control judgment module, a subject label library module, a security log query module and a subject label management module, wherein the interception and filtration module is used for intercepting and filtering the access request of an application program for data in the system; the access control judgment module is used for judging the access behavior of the requesting subject for the object, and refusing or allowing the access behavior; the subject label library module is used for storing the access request right list of the access control strategy library; the security log query module is used for storing dangerous operation information violating access control strategies; and the subject label management module is used for modifying the access request right list of the access control strategy library and querying a security log. The safety of public and general data in the system is ensured.

Description

A kind of access control method and system based on body mark
Technical field
The present invention relates to a kind of operating system, relate in particular to a kind of access control method and system of operating system.
Background technology
The access control of existing operating system; Generally comprise autonomous access control model (Discretionary Access Control), Mandatory Access Control Model (Mandatory Access Control), based on role's access control (Role-Based Access Control) Bell-Lapadula model; And Biba model; Wherein
Autonomous access control model (Discretionary Access Control); The authority that main body can independently be authorized other main bodys the own access control right that has object or authorized from other main bodys withdrawals; With giving or a part of right of the authority that calls off a visit is left individual subscriber for; The keeper is difficult to confirm which user has access rights to which resource, is unfavorable for realizing unified global access control.In many tissues, the user can accessed resources not have entitlement to his institute, and tissue itself is only the real owner of resource in the system.Respectively organize the realization result who generally hopes access control and licensing scheme can be consistent, and, do not allow user's own ground to handle by administrative authority's unified implementation access control with the rules and regulations of organization internal.
Mandatory Access Control Model (Mandatory Access Control) then is to limit the visit of main object according to the permission level of the sensitivity level of object and main body, is used for multistage military systems more.
The Bell-lapadula the main consuming body, object, accessing operation (read, write, read/write) and these notions of level of security, when subject and object was positioned at the different security rank, just there was certain restrict access in main object.After realizing this model, it can guarantee information not visited by unauthorized main body.
The Biba model is developed after the Bell-lapadula model, and it is very similar with the Bell-lapadula model, is used to solve the integrity issue of application data.Bell-lapadula rank (top secret safe in utilization; Secret; Secrets etc.), these level of securitys are used to guarantee that a sensitive information authorized individual visits, and the Biba model is indifferent to the level of security of information privacy; Therefore its access control is not to be based upon on the level of security, but is based upon on the integrity grade.
Above-mentioned access control model; The emphasis of being concerned about all is how to control the access rights of main body to important sub-fraction object; The less relevance main body is to the restrict access of general on a large scale or public object resource in the system; What promptly pay close attention to is the access control relation of main body and one group of important object, and this lets the security of general object or public object resource receive very big threat.
Summary of the invention
In order to solve the deficiency that prior art exists; The present invention provides a kind of access control based on body mark (Subject Label-Based Access Control; Be called for short SLBAC) method and system; Task type according to main body need be accomplished is different, sets the different security mark for various main body, to limit main body all general or public object resources in the system is only had the required minimum access authority of operation.
Be the realization above-mentioned purpose, the access control method based on body mark provided by the invention, this method may further comprise the steps:
1) according to the characteristics of system, sets safety label, set the access request permissions list, set up access control policy storehouse based on body mark for main body;
2) access request of main object in the intercepting system;
3) main body of request visit being carried out safety label detects;
4) judge whether to allow current operation, if allow, the current request of then letting pass, otherwise refusal request.
Wherein, Said step 1) is that the method for main body setting safety label is: be one group of safety label of main body predefine; Each mark is represented the access rights of main body to one group of object; Or by the rational act that main body might occur in system it is classified, and set the different security mark, each mark is represented the access rights of main body to certain type of object.
What wherein, said step 2) the Intercept Interview request was adopted is: in the HOOK subsystem call table, to the kernel calls of object operation.
Wherein, said step 3) is carried out the safety label detection method to the main body of request visit and is: the main body of the access request of utilization interception is removed the access request permissions list in queried access control strategy storehouse, and whether the main body that detects the request visit has safety label;
Wherein, said step 4) further may further comprise the steps:
Do not have safety label if detect request body, then allow current operation;
Utilize the safety label of current request main body; Access request permissions list to wherein detects one by one; With the object of set main body safety label protection wherein; Compared by the request object with current,, then refuse current operation if wherein any current safety label by the request object is identical with the safety label of current request main body; Otherwise, then allow the operation of request body.
For realizing above-mentioned purpose; The present invention also provides a kind of access control system based on body mark, comprises interception filtering module, access control judge module, body mark library module, security log enquiry module, and the body mark administration module; It is characterized in that
Said interception filtering module connects said access control judge module, is used for tackling, the filtering system application program is to the access request of data;
Said access control judge module; Connect said interception filtering module, said body mark library module and said security log enquiry module respectively; Safety label with current main body is as the criterion, and request body is judged refusal or allow should the visit behavior to the visit behavior of target object;
Said body mark library module connects said access control judge module and said body mark administration module respectively, is used to preserve the access request permissions list in access control policy storehouse;
Said security log enquiry module connects said access control judge module and said body mark administration module respectively, is used to store the risky operation information of violating access control policy.
Said body mark administration module connects said body mark library module, is used to revise the access request permissions list in access control policy storehouse.
Wherein, said interception filtering module adopts in the HOOK subsystem call table, and the kernel calls of object operation is obtained the access request data of main object in the system, and accessing request information is sent to said access control judge module; Receive the access request response message that said access control judge module sends, the access request of refusal or permission main body.
Wherein, said access control judge module receives the accessing request information that said interception filtering module sends, and the visit behavior of main body and target object is judged, and the access request response message is sent to said interception filtering module; The risky operation information of violating the body mark access control policy is sent to the security log enquiry module.
 
Access control method and system based on body mark of the present invention; Protection to as if system in the now public data never taken into account of model and non-core general data; Be that one of present model short slab is well replenished, and define main body all general or public object resources in the system are only had the required minimum access authority of operation.
Other features and advantages of the present invention will be set forth in instructions subsequently, and, partly from instructions, become obvious, perhaps understand through embodiment of the present invention.
Description of drawings
Accompanying drawing is used to provide further understanding of the present invention, and constitutes the part of instructions, and with content of the present invention and embodiment, is used to explain the present invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is according to the access control method process flow diagram based on body mark of the present invention;
Fig. 2 is according to the access control system theory diagram based on body mark of the present invention.
Embodiment
Below in conjunction with accompanying drawing the preferred embodiments of the present invention are described, should be appreciated that embodiment described herein only is used for explanation and explains the present invention, and be not used in qualification the present invention.
Fig. 1 is according to the access control method process flow diagram based on body mark of the present invention, below with reference to Fig. 1, the access control method based on body mark of the present invention is described in detail:
At first,,, set safety label, set an access request permissions list, set up access control (SLBAC) policy library based on body mark for main body according to the characteristics of system in step 101; In this step; Can be one group of safety label of main body predefine; Each mark is represented the access rights of main body to one group of object; Also can classify to it by the rational act that main body might occur in system, and set the different security mark, each mark is represented the access rights of main body to certain type of object;
If:
L=Label=mark, each mark all has specific restrict access to certain type of object;
S=Subject=intrasystem main body (operation promoter);
O=Object=intrasystem object (Action Target);
The S of A=Action=in an operation is to the concrete operations behavior of O.
Create following safety label:
Token name: exe_only_r, the mark object of protection is: * .exe file, the authority after the restriction is: read-only; Token name: dll_only_r, the mark object of protection is: * .dll file, the authority after the restriction is: read-only;
Set safety label for the host process of apache web server:
Subject process is: httpd, safety label is: exe_only_r.
After having disposed above SLBAC strategy, the httpd process will can only be read intrasystem exe and dll, can not carry out any destructive operation.
In step 102, intrasystem main body is sent the access request that comprises the concrete operations behavior, A to intrasystem object 1: S 1->O 1
The content of access request comprises: main body (S): user UID+ process PID; Object (O): object full name; Operation (A): requested operation.
In step 103, application program is to the access request of data in the intercepting system;
What the Intercept Interview request was adopted is: in the HOOK subsystem call table, to the kernel calls of object operation.
The purpose of interception: obtain the access request data of main object in the system, and stop its accessing operation when needed.
In step 104, the main body of request visit is carried out the detection of safety label, there is not safety label if judge this main body, then forward step 106 to, otherwise get into next step;
Safety label detection method: SLBAC is implemented in and has safeguarded access request permissions list (employing Adelson-Velskii-Landis tree) in the system kernel; Wherein each represents a main body that the main body safety label had been set; When receiving interception request; SLBAC will remove to inquire about this access request permissions list with request body, if find, representes that then this main body need carry out main body safety label scope check.
In step 105, whether the operation behavior that detects main body receives the restriction of safety label, if receive the restriction of safety label, promptly works as S 1To O 1Operation A 1At S 1Safety label M S1Limited field within the time, forward step 107 to, otherwise work as S 1To O 1Operation A 1Not at S 1Safety label M S1Limited field within the time then get into next step;
Body mark detection mode: the safety label that utilizes the current request main body; Access request permissions list to wherein detects one by one; With the object of set main body safety label protection wherein, contrast one by one with current requested object, if wherein any SLBAC does not allow when operation (current safety label by the request object is identical with the safety label of current request main body); Then refusal operation, on the contrary allow operation.
In step 106, allow operation, main object is carried out concrete operations;
In step 107, the refusal operation is sent failure information to request body.
Fig. 2 is according to the access control system theory diagram based on body mark of the present invention; As shown in Figure 2; Access control system based on body mark of the present invention; Comprise interception filtering module 201, access control judge module 202, body mark library module 203, security log enquiry module 204, and body mark administration module 205
Interception filtering module 201, connected reference control judge module 202 is used for tackling, the filtering system application program is to the access request of data, and accessing request information is sent to access control judge module 202; Receive the access request response message that access control judge module 202 returns, and, access request is handled according to the access request response message.If the operation of access request is allowed to, then,, then initiates to use and return failure information to access request if the operation of access request is under an embargo according to this access request of normal process flow processing of operating system.
Access control judge module 202; Connect interception filtering module 201, body mark library module 203 respectively; And security log enquiry module 204; Receive the accessing request information (access request data of main object) that interception filtering module 201 sends and the access request permissions list of body mark library module 203 transmissions, be as the criterion, the visit behavior between current main body and the target object is judged with the safety label of current main body; Confirm whether access request is allowed to, the access request response message is sent to interception filtering module 201.If do not have safety label or safety label in the data not within the safety label restriction, then return the access request response message that allows visit to interception filtering module 201; If the safety label in the data belongs within the safety label restriction, then return the access request response message of denied access to interception filtering module 201; The risky operation information of violating the SLBAC strategy is sent to security log enquiry module 204.
Body mark library module 203; Judge module 202 and body mark administration module 205 are controlled in connected reference respectively; Be used to store the access control based on body mark (SLBAC) policy library of foundation, the keeper can limit its authority through the safety label that body mark administration module 205 is revised some main bodys of access request permissions list in the SLBAC policy library.
Security log enquiry module 204; Judge module 202 and body mark administration module 205 are controlled in connected reference respectively; Be used to store the risky operation information (security log) of violating the SLBAC strategy, the keeper can inquire about through body mark administration module 205.
Body mark administration module 205; Connect body mark library module 203 and security log enquiry module 204 respectively; Be used for revising the access request permissions list of body mark library module 203 SLBAC policy librarys, and the security log in the query safe log query module 204.
Access control method and system based on body mark of the present invention; Task type according to main body need be accomplished is different; Set the different security mark for various main body; To limit main body all general or public object resources in the system are only had the required minimum access authority of operation; Public data that existing model is never taken into account in the protection system and non-core general data, and the qualification main body only has the required minimum access authority of operation to all general or public object resources in the system.
One of ordinary skill in the art will appreciate that: the above is merely the preferred embodiments of the present invention; Be not limited to the present invention; Although the present invention has been carried out detailed explanation with reference to previous embodiment; For a person skilled in the art, it still can be made amendment to the technical scheme of aforementioned each embodiment record, perhaps part technical characterictic wherein is equal to replacement.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. access control method based on body mark, this method may further comprise the steps:
1) according to the characteristics of system, sets safety label, set the access request permissions list, set up access control policy storehouse based on body mark for main body;
2) access request of main object in the intercepting system;
3) main body of request visit being carried out safety label detects;
4) judge whether to allow current operation, if allow, the current request of then letting pass, otherwise refusal request.
2. the access control method of body mark according to claim 1; It is characterized in that; Said step 1) is that the method for main body setting safety label is: be one group of safety label of main body predefine, each mark is represented the access rights of main body to one group of object, or by the rational act that main body might occur in system it is classified; And set the different security mark, each mark is represented the access rights of main body to certain type of object.
3. the access control method based on body mark according to claim 1 is characterized in that, said step 2) the Intercept Interview request adopt be: in the HOOK subsystem call table, to the kernel calls of object operation.
4. the access control method based on body mark according to claim 1; It is characterized in that; Said step 3) is carried out the safety label detection method to the main body of request visit: the main body of the access request of utilization interception is removed the access request permissions list in queried access control strategy storehouse, and whether the main body that detects the request visit has safety label;
The access control method of body mark according to claim 1 is characterized in that, said step 4) further may further comprise the steps:
Do not have safety label if detect request body, then allow current operation;
Utilize the safety label of current request main body; Access request permissions list to wherein detects one by one; With the object of set main body safety label protection wherein; Compared by the request object with current,, then refuse current operation if wherein any current safety label by the request object is identical with the safety label of current request main body; Otherwise, then allow the operation of request body.
5. the access control system based on body mark comprises interception filtering module, access control judge module, body mark library module, security log enquiry module, and the body mark administration module, it is characterized in that,
Said interception filtering module connects said access control judge module, is used for tackling, the filtering system application program is to the access request of data;
Said access control judge module; Connect said interception filtering module, said body mark library module and said security log enquiry module respectively; Safety label with current main body is as the criterion, and request body is judged refusal or allow should the visit behavior to the visit behavior of target object;
Said body mark library module connects said access control judge module and said body mark administration module respectively, is used to preserve the access request permissions list in access control policy storehouse;
Said security log enquiry module connects said access control judge module and said body mark administration module respectively, is used to store the risky operation information of violating access control policy.
6. said based on the body mark administration module, connect said body mark library module, be used to revise the access request permissions list in access control policy storehouse.
7. the access control system based on body mark according to claim 6; It is characterized in that; Said interception filtering module; Adopt in the HOOK subsystem call table, the kernel calls of object operation is obtained the access request data of main object in the system, and accessing request information is sent to said access control judge module; Receive the access request response message that said access control judge module sends, the access request of refusal or permission main body.
8. the access control system based on body mark according to claim 6; It is characterized in that; Said access control judge module; Receive the accessing request information that said interception filtering module sends, the visit behavior of main body and target object is judged, and the access request response message is sent to said interception filtering module; The risky operation information of violating the body mark access control policy is sent to the security log enquiry module.
CN2011104324364A 2011-12-21 2011-12-21 Subject-label-based access control method and system Pending CN102495989A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104324364A CN102495989A (en) 2011-12-21 2011-12-21 Subject-label-based access control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104324364A CN102495989A (en) 2011-12-21 2011-12-21 Subject-label-based access control method and system

Publications (1)

Publication Number Publication Date
CN102495989A true CN102495989A (en) 2012-06-13

Family

ID=46187814

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104324364A Pending CN102495989A (en) 2011-12-21 2011-12-21 Subject-label-based access control method and system

Country Status (1)

Country Link
CN (1) CN102495989A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103116716A (en) * 2013-01-25 2013-05-22 复旦大学 Immediate access conferring method aiming at low interference of mobile platform
CN103248485A (en) * 2013-04-24 2013-08-14 中国南方电网有限责任公司 Security label-based power secondary system access control method and system
CN103366115A (en) * 2013-07-03 2013-10-23 中国联合网络通信集团有限公司 Safety detecting method and device
CN103647771A (en) * 2013-12-12 2014-03-19 浪潮电子信息产业股份有限公司 Method for carrying out mandatory access controlling on network data packet
CN104298925A (en) * 2014-10-14 2015-01-21 北京可信华泰信息技术有限公司 Design and implementation method of active immunity platform of operating system
CN109495474A (en) * 2018-11-19 2019-03-19 南京航空航天大学 Towards the dynamic access control frame internaled attack
CN109739806A (en) * 2018-12-28 2019-05-10 安谋科技(中国)有限公司 Memory pool access method, internal storage access controller and system on chip
CN109948360A (en) * 2019-02-26 2019-06-28 维正知识产权服务有限公司 A kind of more control domain security kernel construction methods and system for complex scene
CN110290128A (en) * 2019-06-20 2019-09-27 中国科学院信息工程研究所 A kind of Network Isolation and switching control method and device based on service security label
CN110413372A (en) * 2019-06-20 2019-11-05 中国科学院信息工程研究所 A kind of web services middleware extended method for supporting service security to mark
CN110427770A (en) * 2019-06-20 2019-11-08 中国科学院信息工程研究所 A kind of Access and control strategy of database method and system for supporting service security to mark
CN110457268A (en) * 2019-06-20 2019-11-15 中国科学院信息工程研究所 A kind of file operation auditing method and device for supporting service security to mark
CN111159735A (en) * 2019-12-24 2020-05-15 珠海荣邦智能科技有限公司 Data access method and device for application program
CN111177761A (en) * 2019-12-30 2020-05-19 北京浪潮数据技术有限公司 File access control method, device and equipment based on sensitive marks
CN112733165A (en) * 2021-01-07 2021-04-30 苏州浪潮智能科技有限公司 File access control method, device and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070244898A1 (en) * 2002-09-04 2007-10-18 International Business Machines Corporation Row-level security in a relational database management system
CN101667235A (en) * 2008-09-02 2010-03-10 北京瑞星国际软件有限公司 Method and device for protecting user privacy
CN102495988A (en) * 2011-12-19 2012-06-13 北京诺思恒信科技有限公司 Domain-based access control method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070244898A1 (en) * 2002-09-04 2007-10-18 International Business Machines Corporation Row-level security in a relational database management system
CN101667235A (en) * 2008-09-02 2010-03-10 北京瑞星国际软件有限公司 Method and device for protecting user privacy
CN102495988A (en) * 2011-12-19 2012-06-13 北京诺思恒信科技有限公司 Domain-based access control method and system

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103116716A (en) * 2013-01-25 2013-05-22 复旦大学 Immediate access conferring method aiming at low interference of mobile platform
CN103248485A (en) * 2013-04-24 2013-08-14 中国南方电网有限责任公司 Security label-based power secondary system access control method and system
CN103248485B (en) * 2013-04-24 2016-12-07 中国南方电网有限责任公司 A kind of electric power secondary system access control method based on safety label and system
CN103366115A (en) * 2013-07-03 2013-10-23 中国联合网络通信集团有限公司 Safety detecting method and device
CN103366115B (en) * 2013-07-03 2016-03-23 中国联合网络通信集团有限公司 Safety detecting method and device
CN103647771A (en) * 2013-12-12 2014-03-19 浪潮电子信息产业股份有限公司 Method for carrying out mandatory access controlling on network data packet
CN104298925A (en) * 2014-10-14 2015-01-21 北京可信华泰信息技术有限公司 Design and implementation method of active immunity platform of operating system
CN104298925B (en) * 2014-10-14 2017-07-21 北京可信华泰信息技术有限公司 The design and implementation method of operating system active specific immunotherapy platform
CN109495474B (en) * 2018-11-19 2021-04-13 南京航空航天大学 Dynamic access control method facing internal attack
CN109495474A (en) * 2018-11-19 2019-03-19 南京航空航天大学 Towards the dynamic access control frame internaled attack
CN109739806A (en) * 2018-12-28 2019-05-10 安谋科技(中国)有限公司 Memory pool access method, internal storage access controller and system on chip
CN109948360A (en) * 2019-02-26 2019-06-28 维正知识产权服务有限公司 A kind of more control domain security kernel construction methods and system for complex scene
CN110413372A (en) * 2019-06-20 2019-11-05 中国科学院信息工程研究所 A kind of web services middleware extended method for supporting service security to mark
CN110427770A (en) * 2019-06-20 2019-11-08 中国科学院信息工程研究所 A kind of Access and control strategy of database method and system for supporting service security to mark
CN110457268A (en) * 2019-06-20 2019-11-15 中国科学院信息工程研究所 A kind of file operation auditing method and device for supporting service security to mark
CN110290128A (en) * 2019-06-20 2019-09-27 中国科学院信息工程研究所 A kind of Network Isolation and switching control method and device based on service security label
CN110457268B (en) * 2019-06-20 2022-06-28 中国科学院信息工程研究所 File operation auditing method and device supporting business security marking
CN111159735A (en) * 2019-12-24 2020-05-15 珠海荣邦智能科技有限公司 Data access method and device for application program
CN111177761A (en) * 2019-12-30 2020-05-19 北京浪潮数据技术有限公司 File access control method, device and equipment based on sensitive marks
CN112733165A (en) * 2021-01-07 2021-04-30 苏州浪潮智能科技有限公司 File access control method, device and medium
CN112733165B (en) * 2021-01-07 2022-09-20 苏州浪潮智能科技有限公司 File access control method, device and medium

Similar Documents

Publication Publication Date Title
CN102495989A (en) Subject-label-based access control method and system
CN102495988A (en) Domain-based access control method and system
CN103065100B (en) Container-based method of users to protect private data
CN104318171B (en) Android private data guard methods and system based on rights label
CN102202062B (en) Method and apparatus for realizing access control
CN106326699A (en) Method for reinforcing server based on file access control and progress access control
CN102043927B (en) Data divulgence protection method for computer system
CN103268438A (en) Android authority management method and system based on calling chain
CN101901313A (en) Linux file protection system and method
CN101727545A (en) Method for implementing mandatory access control mechanism of security operating system
US20100100929A1 (en) Apparatus and method for security managing of information terminal
CN103890772A (en) Sandboxing technology for webruntime system
CN104751050A (en) Client application program management method
CN104732147A (en) Application program processing method
CN102254123B (en) Method and device for enhancing security of application software
CN105827645B (en) Method, equipment and system for access control
CN104735091A (en) Linux system-based user access control method and device
CN102143168B (en) Linux platform-based server safety performance real-time monitoring method and system
CN106228078A (en) Method for safe operation based on enhancement mode ROST under a kind of Linux
CN102592076B (en) Data tamper-proof method and device
CN104978543A (en) Mobile terminal information safety protection system and method
CN104732140A (en) Program data processing method
CN105049445A (en) Access control method and stand-alone access controller
CN102663313A (en) Method for realizing information security of computer system
CN101827091A (en) Method for detecting Solaris system fault by utilizing mandatory access control

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120613