基于HIPS技术的虚拟机文件访问控制研究与实现-计算机应用技术专业论文.docxVIP

基于HIPS技术的虚拟机文件访问控制研究与实现-计算机应用技术专业论文.docx

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
  4. 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
  5. 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们
  6. 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
  7. 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
基于HIPS技术的虚拟机文件访问控制研究与实现-计算机应用技术专业论文

式,这种访问控制形式最终以访问控制规则集的形式体现。本文通过采 用 HIPS 技术中最先进的 Runtime patching 技术,编写内核态过滤函数, 以从服务器获得与角色对应的规则集为依据过滤对文件进行操作的行 为;进而针对在 Windows XP 环境下安装 VMware Player 虚拟机的全虚拟 化技术实现了对虚拟机与宿主机之间的文件访问控制。 关键词:HIPS 技术,虚拟机技术,访问控制,Rootkit Research and Implementation of HIPS Technology based File Access Control between Host and Virtual Machine ABSTRACT Virtualization, firstly mentioned by Christopher Strachey in his report: Time sharing in large, fast computers, in the international conference on information processing, in Paris, June, 1959. Since then, Virtualization technology has been made great progress. Now, Virtualization technology is widely applied in the information systems, as it behaves excellently in saving resources and centrally management. Sever virtual machine, one kind of the typical virtualization products, has been widely used in the enterprise information construction. However, the terminal virtual machine product is now rarely used in the high requirement of secure isolation organization. Basically, there are two reasons. On the one hand, these organizations has strict policy of secure isolation, on the other hand, the secure isolation of terminal virtual machine now is not that unassailable. So, strengthen the secure isolation of terminal virtual machine becomes a vital problem. This article focused on this problem and tried to make file access between the virtual machine and the host can be controlled and securely. Based on some research on file access between the virtual machine and the host, access control Matrix, RBAC (Role Based Access Control) and OBAC (Organization Based Access Control), the article designed a model for file access between the virtual machine and the host and proposed some division principles of users and roles. The new model presents as access control rules set. In the article, we applied the most advanced HIPS technology: Runtime patching in the programming of the Kernel filter functions, which is considered to filter process behavior of manipul

您可能关注的文档

文档评论(0)

131****9843 + 关注
实名认证
文档贡献者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档