The design process of trusted operating system was shown
as Tab. 1. First, linux utilities were analyzed by secure-oriented
policy, which were divided into two parts: general applications
and trusted processes. Trusted processes contain register process, administrator process, privilege user process, etc. They
come from two parts: one is the security expansion of the
original procedures, the other is the new programs. They are
associated with the security mechanisms core.