Research on the Application Security Isolation Model
نویسندگان
چکیده
With the rapid development of information technology, the secrutiy problems of information systems are being paid more and more attention, so the Chinese government is carrying out information security classified protection policy in the whole country. Considering computer application systems are the key componets for information system, this paper analyzes the typical security problems in computer application systems and points out that the cause for the problems is lack of safe and valid isolation protection mechanism. In order to resolve the issues, some widely used isolation models are studied in this paper, and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and the least privilege principle. After that, this paper introduces the design ideas of NASI, gives out formal description and safety analysis for the model, and finally describes the implementation of the prototype system based on NASI.
منابع مشابه
Lind: Challenges turning virtual composition into reality
Security is a constant sore spot in application development. Applications now need structural support for better isolation and security on a domain specific basis to stave off the multitude of modern security vulnerabilities. Currently, application developers have been relying upon cumbersome workarounds to address these issues. We propose the design and initial implementation details for Lind,...
متن کاملSecure Multi-tenant Application in Software as a Service
A multi-tenant application in Software as a Service (SaaS) is accessed by multiple organizations called tenants who have several users attached to them. Multi-tendency enhances resource utilization by effectively sharing resources and reducing cost, increasing productivity and online collaboration. However, providing a secure multi-tenant access to various tenants is still a challenge. Traditio...
متن کاملDesigning a career path model based on knowledge management model in Mazandaran Social Security Organization
Background and Aim: Knowledge management is the cycle of discovery, production, storage, distribution, and practical application of knowledge in the organization. Occurs. Work experiences, social groups, and outcomes that determine the path to progress may be limited (in the form of a profession or organization) or broad (the path to progress in society in a wide range of different professions ...
متن کاملApplication of Shape Memory Alloys in Seismic Isolation: A Review
In the last two decades, there has been an increasing interest in structural engineering control methods. Shape memory alloys and seismic isolation systems are examples of passive control systems that use of any one alone, effectively improve the seismic performance of the structure. Characteristics such as large strain range without any residual deformation, high damping capacity, excellent re...
متن کاملSikker: A High-Performance Distributed System Architecture for Secure Service-Oriented Computing
In this paper, we present Sikker1, a high-performance distributed system architecture for secure service-oriented computing. Sikker includes a novel service-oriented application model upon which security and isolation policies are derived and enforced. The workhorse of Sikker is a custom network interface controller, called the Network Management Unit (NMU), that enforces Sikker’s security and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010