博碩士論文 104522069 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系zh_TW
DC.creator王禹軒zh_TW
DC.creatorYu-Hsuan Wangen_US
dc.date.accessioned2020-11-13T07:39:07Z
dc.date.available2020-11-13T07:39:07Z
dc.date.issued2020
dc.identifier.urihttp://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=104522069
dc.contributor.department資訊工程學系zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstract處在資訊科技的社會中,隨處可見的科技產品皆為一個資訊系統,負 責處理成千上萬的資訊,資訊安全領域中強調透過安全防護技術達成資訊 的機密性 (Confidentiality)、整體性 (Integrity) 和可用性 (Availability)。 在市場中存在著諸多的設備,又有多少設備在運行時可以達到上述的安 全需求,國際標準中有提到存取控制對於達成上述安全需求扮演著重要 的角色,論文中以存取控制為主軸思考輔以 SELinux 為實際技術展示, 講解並分析如何透過存取控制達成資訊的機密性 (Confidentiality)、整體 性 (Integrity) 和可用性 (Availability)。本篇論文的目的及動機為幫助開 發者了解存取控制並且有足夠能力從頭開始在一個新的系統環境上部署 SELinux,並且解析如何能夠在有限度的假設之下自動產生 SELinux 政 策與其所遭遇的困難。zh_TW
dc.description.abstractNowadays, The concept of Access Control exists everywhere in our daily life and can protect our asset from unauthorized use, for example us- ing badge to enter the company entrance gate or card key when you back to home. In the area of Information Security, Access Control, a part of Risk Management, is used to keep confidentiality, integrity and availabil- ity of information, which are usually called CIA triad, from unauthorized disclosure, disruption and access. Access to protected information must be restricted to people who are authorized to access the information. The computer programs, and in many cases the computers that process the information, must also be authorized. This requires that mechanisms are in place to control the access to protected information according to Access Control procedures or policies specified by Administrator. Essentially, the core of Access Control, procedures or policies are implemented to make the mechanism know how to ensure which subject is authorized to access what object within the organizations. The hardest part of Access Control is to create a suitable policy which can not restrict too strict or loose. SELinux is prevalently applied to cloud server and embedded system, but seldom people really know how to configure SELinux or correctly enable SELinux on their system. With the regulation and law progressing, vendors is asked to protect their devices with Access Control. However, there are less pa- pers describing how to apply SELinux on the system in technical detail. Hence, this paper is managed to help people enable and configure SELinux on their system step by step.en_US
DC.subject系統安全zh_TW
DC.subject存取控制zh_TW
DC.subject安全增強式 Linuxzh_TW
DC.subjectsystem securityen_US
DC.subjectAccess Controlen_US
DC.subjectSELinuxen_US
DC.titleBAESGP:A Bottom-up Approach to Enable SELinux and Generate Policies for Unknown Linux Distributionsen_US
dc.language.isoen_USen_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明