1) Sign and identification: Sign and identification
mechanism is used to ensure that only legitimate users can
access the system resources. It recognizes the true identity of
each user, and gives an unique identifier for each user.
2) Discretionary Access Control(DAC): Discretionary
access control mechanism is to control the access according to
the users’ desires. The user would be permitted to access the
certain resources which are regulated in advance.
3) Mandatory Access Control (MAC): Mandatory access
control mechanism classifies the system information, and gives
secure level for every process, file and IPC(interprocess
communication) object. When a process accesses a file in
computer system, its operating system inspects the process
with security identification and access means first. Then it
compares the secure level of process to that of the file. If the result accords with the rules, the operating system would let the
process visit the file.
4) Least Privilege Management: Least privilege
management is to divide super-user privileges into a group of
fine-grained privileges, and delegated them to different system
operators and administrators. This makes different system
administrators and operators have the least privileges to
accomplish their missions.
5) Audit: The audit is to set the sampling point in the
security-related functions to collect audit information. These
sampling points are distributed in the system calls and related
commands, calling the audit process to record, dump and
archive audit information.
6) Trusted path: Trusted path is to guarantee that the user
is communicating with the real system, not the Trojan horse
programs which aimed at stealing user passwords and
information.
7) Trusted software: Trusted software not only provides
trusted software environment based on trusted root, but also
supplies a full set of tss(trusted software stack) for upper
trusted software’s calling. In addition, we developed
Encrypting File System and Double-key Authentication
utilizing tss. Double-key authentication will be introduced in
part 3.