首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
论述了雷达系统软件中操作系统抽象层存在的必要性,并给出其在雷达系统中的实现,即采用操作系统扩展(OSE)技术来实现应用软件的平台无关,通过对不同操作系统的核心功能的重新定义、优化和封装,得出一个共用的面向应用开发的屏蔽平台差异的操作系统抽象层,同时在这个抽象层中结合雷达系统软件的特点提供了适用于雷达系统软件的底层功能,用以支持雷达系统软件跨平台,提高关键应用的效率,缩短项目的开发时间。  相似文献   

2.
Secuve TOS 是世界上第一个将数字签名证书认证机制成功运用到主机的操作系统,以实现对商业网站以及服务器安全保护的产品。通过从核心层截取文件访问控制,以加强操作系统安全性。它具有完整的用户认证、访问控制及审计功能,采用集中式管理,克服了分布式系统在管理上的许多问题。产品特点基于数字签名证书认证用户;优化的访问控制、权限分离;具有入侵响应功能;完善的产品自身保护;分布部署、集中管理;独一无二的用户认证机制。大部分信息系统使用ID和口令保护自身安全。但是单独的口令不能带来充分的保护,它们很容易被共享和猜出来。有…  相似文献   

3.
介绍了保护主机安全的策略、主机存在的风险,并详细阐述了Windows、Linux和Unix操作系统的安全加固方法以及注意事项.  相似文献   

4.
概要:文章提出了一种操作系统抽象层的概念,统一了操作系统架构并建立了一组可用于不同操作系统的公共API。为了实现高效地可移植性,使用了一组操作系统原语,其独立于操作系统和体系结构。文章实现了目前两款广泛应用操作系统的顶层抽象,并评估对比了开销。  相似文献   

5.
一个完整、健全的信息安全防护体系必须包括操作系统的安全。航天中嘉华诚网络安全技术有限公司在Windows系统网络安全技术领域引入内核加固的崭新理念,研究开发出具有自主知识产权的GKR操作系统内核加固技术,大幅度地提高了操作系统安全的认证等级,对提高计算机操作系统安全,引导网络安全技术应用观念的转变都具有重要意义。公司在对市场进行大量调研的基础上,按照不同用户的需求,开发出GKR操作系统内核加固产品,主要由文件保护、注册表保护、进程保护、服务保护、网络保护、用户特权等模块组成,从内核层实现对文件、注册表等系统资源全…  相似文献   

6.
刘炜 《电子科技》2016,29(7):88
广电网络中的操作系统,决定了主机安全防护系统中安全防护功能的有效性和自身程序的安全性。文中设计了一种基于BIOS校验的可信操作系统启动方法,通过对操作系统的身份验证来保证可信的操作系统被正确启动,同时运用文件分配表隐藏技术来防止操作系统被破坏和保护硬盘数据。该法校验准确性较高,且数据安全性较好。  相似文献   

7.
共享卫士     
在由共享卫士搭建成的局域网环境内,安装在服务器上的软件会修改各接入主机的Windows底层及伊数据报文做伪装处理,保护用户共享上网安全,确保用户网络应用不受限制或干扰。本软件支持Windows 2000/Windows XP/Windows 2003等操作系统平台上的ADSL拨号或固定IP接入共享应用,支持单网卡或多网卡共享接入方式。  相似文献   

8.
目前,我国计算机信息系统中的主流操作系统基本采用进口的C 级操作系统,即商用操作系统。它在为我们带来无限便捷的同时,也为信息安全、通信保密乃至国家安全带来了隐患。正因为如此,国家颁布的计算机信息系统安全保护条例中把操作系统的安全列为核心要求。 中国航天北京中嘉华诚公司从关注计算机操作系统的安全入手,暂时避开自主知识产权的安全操作系统研发的庞大课题,成功实现了商用操作系统内核级安全加固技术,并推出了GKR 操作系统内核加固系统产品。 GKR 操作系统内核加固产品通过设置独立于系统安全配置之外的安全访问规则,细化…  相似文献   

9.
实时图像处理并行操作系统的微内核设计和实现   总被引:6,自引:0,他引:6  
刘鹏  姚庆栋 《电子学报》1999,27(7):42-46
本文主要设计和实现了运行在数字信号处理阵列上支持中高层图像处理的实时图像处理并行操作系统(RTIPPOS)微内核,该内核提供了任务分解模型,并发进程管理,支持局部消息传递,同步,设计了快速共享消息传递方式和它辅助性能,内核原语支持POSIX系统调用的C语言接口和抽象级的用户封装,有行为的高效性和预测性,本文是对RTIPPOS微内核设计的综述。  相似文献   

10.
Windows DEP数据执行保护技术研究   总被引:1,自引:0,他引:1  
缓冲区溢出漏洞是危害最大、影响范围最广的漏洞之一,普遍存在于各类系统和应用软件中。操作系统中的数据执行保护(DEP,Data Execution Prevention)技术,是一项有效的安全保护技术,能够有效防范缓冲区溢出攻击,维护操作系统安全,但是该技术仍然存在一定的局限性。文中通过一个突破数据执行保护,利用缓冲区溢出漏洞成功执行注入代码的实例来说明数据执行保护技术存在的局限性,并提出了一些解决数据执行保护技术局限性的方法和建议。  相似文献   

11.
The Firefox Kid     
《Spectrum, IEEE》2006,43(11):26-31
Blake Ross, one of the developers of Firefox which is one of the biggest open-source success stories is developing again a new project named Parakey. It is a Web operating system that can do everything an OS can do. It makes it really easy to store your stuff and share it with the world. There are differences between the two projects, however. Although Ross plans to incorporate the talents and passions of the free-software community, he's building Parakey around a for-profit business model  相似文献   

12.
This paper introduces hthreads, a unifying programming model for specifying application threads running within a hybrid computer processing unit (CPU)/field-programmable gate-array (FPGA) system. Presently accepted hybrid CPU/FPGA computational models-and access to these computational models via high level languages-focus on programming language extensions to increase accessibility and portability. However, this paper argues that new high-level programming models built on common software abstractions better address these goals. The hthreads system, in general, is unique within the reconfigurable computing community as it includes operating system and middleware layer abstractions that extend across the CPU/FPGA boundary. This enables all platform components to be abstracted into a unified multiprocessor architecture platform. Application programmers can then express their computations using threads specified from a single POSIX threads (pthreads) multithreaded application program and can then compile the threads to either run on the CPU or synthesize them to run within an FPGA. To enable this seamless framework, we have created the hardware thread interface (HWTI) component to provide an abstract, platform-independent compilation target for hardware-resident computations. The HWTI enables the use of standard thread communication and synchronization operations across the software/hardware boundary. Key operating system primitives have been mapped into hardware to provide threads running in both hardware and software uniform access to a set of sub-microsecond, minimal-jitter services. Migrating the operating system into hardware removes the potential bottleneck of routing all system service requests through a central CPU.  相似文献   

13.
随着智能操作系统和云计算技术的发展,Web OS作为一种新的以云服务为主的智能操作系统已经进入大家的视野。文章从Web OS的产品概念演变开始,分析Web OS早期和现阶段的产品特点,总结现阶段Web OS的发展现状以及将来的发展趋势。  相似文献   

14.
张尧学  周悦芝 《电子学报》2011,39(5):985-990
云计算正成为计算机研究和应用的热点.在云计算研究的许多问题中,云计算操作系统的研究受到了广泛重视.但是,至今为止,人们对什么是云计算操作系统?怎样研制云计算操作系统?以及为什么要有云计算操作系统等问题并没有给出答案,也没有看到成功的云计算操作系统实例.本文从透明计算,也就是用户控制的云计算(Customer Contr...  相似文献   

15.
Employing the Gompertz model, this study examines macro-level adoption factors of early smartphone diffusion in OECD and BRICS countries. The results of the data analysis suggest that mobile OS competition, mobile network standard competition, open source OS share (platform openness), and price influence the early diffusion of smartphones in OECD countries. However, in BRICS countries, open source OS share (platform openness) and price are the main factors of smartphone diffusion. As the smartphone market continues to grow, it seems that the effects of mobile platform competition and indirect network effects on smartphone diffusion may co-exist in global smartphone markets. In addition, the results of the data analysis suggest that a platform (standard)-neutral policy is important in the growth stage of smartphone markets.  相似文献   

16.
The objective of autonomic networking is to enable the autonomous formation and parametrization of nodes and networks by letting protocols sense and adapt to the networking environment at run time. Besides its dynamic aspects, a core requirement of autonomic networking is to define a structured framework and execution environment that enables algorithms to operate in a continously changing environment. This paper presents the major design principles of the Autonomic Network Architecture (ANA) and reports on a first implementation. The guiding principle of ANA is to strive for flexibility and genericity at all levels of the architecture. In our approach we explicitly avoid to impose a "one-size-fits-all" architecture (where communication protocols and paradigms are fixed by the architecture). To this end, ANA introduces generic abstractions, for example "information dispatch points" instead of addressable endpoints, as well as communication primitives that support network heterogeneity, adaptability, and evolution. These core abstractions allow for the coexistance of multiple and diverse networking styles and protocols. With the public release of the ANA prototype, we aim at federating autonomics related networking projects, enabling different actors to share, compare, and build upon each other?s work. The ANA runtime can host clean slate network designs as well as legacy Internet technology and serves as a platform for demonstrating autonomic communication principles.  相似文献   

17.
随着计算机信息化应用技术的发展,Mac OS X作为苹果电脑的MAC系列产品专属的操作系统,为苹果电脑用户进行外语学习提供了技术支持.基于Mac OS X的多媒体外语开放式学习平台为高校大学生更好的学习外语提供了更多的帮助.本文对Mac OS X技术进行了分析,对大学外语多媒体学习的现状进行了研究.在Mac OS X技术的基础之上对多媒体外语开放式学习平台进行了设计研究,对基于Mac OS X的多媒体外语开放式学习平台的特点和关键性应用技术进行了介绍.  相似文献   

18.
Wireless sensor-actuator systems (WSAS) offer exciting opportunities for emerging applications by facilitating fine-grained monitoring and control, and dense instrumentation. The large scale of such systems increases the need for such systems to tolerate and cope with failures, in a localized and decentralized manner. We present abstractions for detecting node failures and link failures caused by topology changes in a WSAS. These abstractions were designed and implemented as a set of reusable components in nesC under TinyOS. Results, which demonstrate the performance and viability of the abstractions, based on experiments on an 80 node testbed are presented. In the future, these abstractions can be extended to detect and cope with larger classes of failures in WSAS.  相似文献   

19.
The objective of operating system (OS) discovery is to find which OSs are running on computers in a given network. There are two existing strategies for OS discovery—active and passive—each having fundamental limitations. This paper discusses how the theory of diagnosis can be used to address, in a simple and elegant way, the problems associated with OS discovery. The problems are formalized in a logical framework and solutions are obtained through automated reasoning. The result of using such a knowledge‐oriented approach is a natural unification of the active and passive methods of OS discovery in a hybrid approach. This paper also illustrates the benefits of the hybrid approach by comparing its accuracy with other existing OS discovery tools through a large‐scale experiment.  相似文献   

20.
Future routers will not only forward data packets but also provide value-added services, such as security, accounting, caching, and resource management. These services ran be implemented as general programs, to be invoked by traversing packets embedding router program calls. Software-programmable routers pose new challenges in the design of router operating systems (OS). First, router programs will require access to diverse system resources. The resource demands of a large community of heterogeneous resource consumers must either be coordinated to enable cooperation or arbitrated to resolve competition. Second, it is beneficial to concurrently support multiple virtual machines, each with a guaranteed share of physical resources. This allows services to be customized and to seamlessly evolve. We present the design and implementation of a next generation router OS that can meet the above challenges. We define an orthogonal kernel abstraction of resource allocation, which can schedule various time-shared and space-shared resources with quality of service (QoS) differentiation and guarantees. A scalable and flexible packet classifier enables dynamic resource binding and per-flow processing of received packets. We have prototyped our system on a network of UltraSPARC and Pentium II computers. Currently, QoS-aware schedulers for CPU time, forwarding bandwidth, memory-store capacity, and capacity for secondary data stores have been integrated. We present experimental results on various aspects of resource management in our system  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号