计算机与现代化

• 信息安全 • 上一篇    下一篇

双重触发的嵌入式系统内核安全访问控制

  

  1.  (1.西安工业大学计算机科学与工程学院,陕西西安710021; 2.西北工业大学计算机学院,陕西西安710072)
  • 收稿日期:2017-12-25 出版日期:2018-06-13 发布日期:2018-06-13
  • 作者简介:黄姝娟(1975-),女,陕西渭南人,西安工业大学计算机科学与工程学院讲师,博士,研究方向:嵌入式与分布式计算; 朱怡安(1961-),男, 安徽宿州人,西北工业大学计算机学院教授,博士生导师,研究方向:高性能计算,云计算和普适计算; 高武奇(1975-),陕西合阳人,副教授,博士,研究方向:数据挖掘,计算机仿真,云计算; 罗钧旻(1963-),男,陕西洛南人,教授,硕士生导师,研究方向:智能科学与计算科学。
  • 基金资助:
    陕西省科技厅重点研发计划项目(2017GY-070); 民用飞机专项科研项目(MJ-2015-D-066); 新型网络与检测控制国家地方联合工程实验室基金资助项目(GSYSJ2017004)

  Dual Triggered Security Access Mechanism for Embedded System Kernel

  1.  (1. School of Computer Science and Engineering, Xi’an Technological University, Xi’an 710021, China; 
      2. School of Computer Science, Northwestern Polytechnical University, Xi’an 710072, China) 
  • Received:2017-12-25 Online:2018-06-13 Published:2018-06-13

摘要: 随着外部事件的不可预知性和实时任务复杂性的增加,传统的仅采用基于事件触发机制的嵌入式实时操作系统的设计变得更加困难,在很多情况下,该系统难以保证实时运行过程中的安全性与可靠性。本文针对μC/OS-II在设计之初并没有考虑时间触发以及安全访问控制机制的特性,结合OSEK时间触发标准,设计并实现一种符合OSEK标准的、基于时间/事件双重触发的内核任务调度机制,并在该调度机制中,提出通过采用通用访问控制框架(GFAC)和安全属性映射表的方法,保证了不同角色对系统访问的安全访问控制。实验结果表明,所设计的调度机制和访问控制方法不仅满足了时间和事件双重触发特征,而且加强了对内核的安全访问控制操作并具有良好的使用效能。

关键词: 时间/事件触发, 嵌入式系统, 内核, 安全访问

Abstract: With the increment of the unpredictability of external events and the complexity of real-time task, it is becoming more and more difficult to design an embedded real-time operating system only by traditional event-triggered-based mechanism. In many cases, the system is difficult to guarantee the safety and reliability in real-time processing. Because the designer of μC/OS-Ⅱ did not consider the time-triggered tasks and the security access control mechanism at the beginning of the design, combined with the time-triggered OSEK standard, this paper designs and implements a kernel scheduling mechanism which not only  can correspond to OSEK standard but also support the time-triggered and event-triggered tasks. In addition, it also can achieve an access control for security system by using GFAC and a security attribute mapping table. The experimental results show that the designed scheduling mechanism and access control method not only meet the double triggered characteristics, but also enhance the security access control for kernel, and have a good efficiency.

Key words: time and event triggered, embedded system, kernel; security access

中图分类号: