自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(8)
  • 资源 (29)
  • 问答 (2)
  • 收藏
  • 关注

原创 总结今天的任务完成状况。

    发现了不少新的知识点,和不足之处。比如说:任务上下文切换时,栈的使用方式。如何分配栈的空间。这时以前没有考虑到的。现在需要再阅读资料来分析设计。其次时钟节拍的具体实施方法很多。要选择适合MyOS(51)使用的一种。    今天的完成的任务有将OS.C的文件下包含哪些函数做了归纳。每个函数的功能做了说明。其中对调度器OSSched()进行了设计,绘制出了流程图。并且设计出调度器所操作的对象T

2005-01-07 20:45:00 880

原创 有了新的发现

有了新的发现!在快速阅读μC/OS-II的中文资料的时候,发现Small RTOS51里面的组织结构和文档和μC/OS-Ⅱ的非常相似。包括文件目录的安排都是和μC/OS-Ⅱ几乎是一样的。所以,我可以按照μC/OS-Ⅱ的形式来写这个静态的并发实时操作系统了!今天完成了includes.h的编写。^o^!!这是个include了其它头文件的头文件。还有写了配置文件OS_cfg.h,模仿Small RT

2005-01-06 21:59:00 686

原创 建立数据字典的一点总结

建立数据字典的一点总结这两天在进行数据字典的建立。看到两种建立数据字典的途径:一种是将已有的其它同类操作系统的源码拿来,找出都有哪些文件和函数。另一种是根据已有的理论书籍(包括《Real-Time Concepts for Embedded Systems》)来找出MyOS(51)所需要的和未来需要的函数操作与对象。后来我决定同时使用两种方法来建立数据字典这两天在建立数据字典的过程中使用到了若干工

2005-01-06 21:53:00 4215

原创 MyOS(51)的可行性研究和需求分析

开始加入需求分析阶段MyOS(51)的可行性研究已经结束。从各方面得到的信息证明,我一个人用两个月时间作出一套操作系统是可以实现的。理由如下:1、首先基础知识的储备基本足够。如果在实践过程中出现未知的技术问题,也都是可以在容忍的时间范围内完成学习和积累。因为主题知识架构已经完成。所以关于技术风险是我可以克服的。2、而时间风险考虑到我现在是全部时间用来做这个东西,所以,按照两个月时间来推算应该是足够

2004-12-30 15:08:00 872

原创 内存管理的续与用并发将应用模块化 (读书笔记)

阻塞与非阻塞的内存函数实际中,设计良好的内存分配函数应当允许进行永久阻塞(bloking forever)、时限阻塞(blocking for a timeout period)或永不阻塞(no blocking at all)的分配。一个阻塞内存分配函数可以使用一个计数信号量或者一个互斥信号量锁(mutex lock)实现。  分配请求必须首先成功的获得计数信号量,接着获取互斥信号量锁。当阻塞内

2004-12-30 15:01:00 754

原创 内存管理的读书笔记

我继续我的任务!今天获得的信息对论文可能没有生命帮助,但是对于将来也许有跟总要的作用。因为我相信MyOS(51)如果能够长大,它见来一定需要内存管理机制的。[size=5]内存管理[/size]知道内存管理系统的能力可以辅助应用设计并且有助于避免陷阱。如果使用到动态的进程建立,就需要分配给进程一定的资源,其中包括内存资源。还有在其它时刻,有的系统支持动态的建立数据结点或者其它什么动态变量。就需要面

2004-12-28 00:00:00 1067

原创 第11章 计时/计数器及其服务 与 第12章 I/O子系统

今天看的内容主要是再次试图理解了计时器里的一些概念!好玄啊!!作者是玄真教的?!续昨天,我的理解是:这里使用了与精灵任务相似的做法,即使用两个部分,分别存在于ISR和任务的上下文中。但是目标不同。精灵任务是为了防止ISR长时间占用系统资源使任务处于饥饿状态,而采取的措施。而这里是为了防止ISR过长,会产生系统时间的飘逸甚至丢失。同时还可以用一个timer同时管理若干个软计时器任务(这里好像应该

2004-12-24 22:54:00 1028

原创 可算找到组织了!可算见到同志了!!我之前在BLOGCN上有个BLOG: http://johnnny_jiang.blogone.net/

我在这里感到特别的亲切啊!!只是相见恨晚啊!!以后我的BLOG就同时在这两个地方发布了!^o^我现在在做我的毕业设计(一个嵌入式多任务实时操作系统)。正在做前期的技术沉淀和总体设计与数据字典的编制。欢迎到我BLOGCN的日志中看我前面的内容啊!!见笑了!!

2004-12-24 21:30:00 1119 1

麦考瑞大学网络安全课件 week4

Security Models Access Control Model Access Control Matrix Capabilities Authorization Policies

2012-01-20

A Logical Specification and Analysis for SELinux MLS Policy

ABSTRACT The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject’s access rights. The problem is that the richness of this policy makes it impractical to verify, by hand, that a given policy has certain important information flow properties or is compliant with another policy. To address this, we have modeled the SELinux MLS policy using a logical specification and implemented that specification in the Prolog language. Furthermore, we have developed some analyses for testing the properties of a given policy as well an algorithm to determine whether one policy is compliant with another. We have implemented these analyses in Prolog and compiled our implementation into a tool for SELinux MLS policy analysis, called PALMS. Using PALMS, we verified some important properties of the SELinux MLS reference policy, namely that it satisfies the simple security condition and ?-property defined by Bell and LaPadula [2].

2012-01-20

Guidelines for the management of IT evidence

IT证据管理的指导准则 HB 171—2003 Preface This handbook has been prepared by Committee IT/012, Information Systems, Security and Identification Technology. It is intended for use as a reference document by a variety of audiences, including— a) executives and Boards responsible for ensuring the existence of records that can be used in protecting the interests of their organization by initiating or defending legal proceedings or in their fulfilling a social responsibility as a witness; b) personnel who are responsible for designing/acquiring information technology systems that produce and/or store records and the staff responsible for their use and operation; c) personnel conducting an investigation or enquiry involving electronic records; and d) adjudicators who base their decision, at least partially on IT evidence (e.g. judiciary, tribunal members, administrative management). The authors recognize the cross-disciplinary nature of the management of IT evidence, involving as it does business, legal and information technology professionals. As far as possible, the handbook has been written in “plain English” minimizing both legal and technical jargon. Qualification This handbook does not purport to provide legal advice. Compliance with this handbook does not guarantee the legal admissibility of electronic records—it is a statement of best practice. Organizations are encouraged to seek both legal and other expert advice when implementing information technology systems that create, store, process or transmit documents of significant evidentiary value. Acknowledgements Standards Australia would like to acknowledge Ajoy Ghosh’s efforts in drafting this handbook, authorship of which was sponsored jointly by the Commonwealth Attorney-General’s Department and the Australian Federal Police. The following organizations have contributed to the writing of this handbook: AusCERT Australian Federal Police Australasian Centre for Policing Research Australian Prudential Regulation Authority Australian Securities and Investment Commission Australian Taxation Office Action Group on E-Commerce Commonwealth Attorney-General’s Department Deacons Defence Signals Directorate Standards Australia sub-committee IT/012/04 (Security Techniques)

2012-01-25

TKS系列仿真器快速入门手

TKS系列仿真器快速入门手_TKS 系列仿真器的技术优势 TKS 系列仿真器是广州致远电子有限公司推出的高性能实时在线仿真器可以实时在线仿真PHILIPS 半导体公司的80C51 系列单片机的同时还能够实时在线仿真ATMEL HY Winbond 等公司的兼容MCS-51 内核的标准80C51 单片机彻底解决80C51 开发中仿真工具的瓶颈问题 TKS 系列仿真器在硬件上采用了PHILIPS 授权的HOOKS/Bondout 仿真技术并加以改进几乎支持所 有的80C51 系列单片机的实时仿真能保证用户更加方便的操作和更加真实的仿真效果并能直接或通过 简单的升级支持仿真PHILIPS 陆续推出的全系列80C51 内核单片机每种型号的仿真器均能支持多种不同 型号80C51 单片机的仿真我们将能得到世界第一大80C51 内核单片机供应商PHILIPS 半导体公司详尽的 技术支持并为用户提供准确可靠真实的仿真性能 购买正版软件请与德国 Keil 公司签约商业合作伙伴广州周立功单片机发展有限公司联系与此同时 Keil 公司将全面支持我们的仿真器开发TKS 系列仿真器除使用自主版权的调试环境和编译软件外还可 以同Keil 调试软件无缝嵌接并能得到Keil 公司的强力技术援助具备强大调试功能Keil 的IDE 环境将全 面提升TKS 系列仿真器的操作性能

2012-04-25

Using SELinux security enforcement in Linux-based embedded devices

ABSTRACT This contribution describes how Security Enhanced Linux (SELinux) is enabled on a Nokia 770 Internet Tablet. It will refer to a procedure done under a Debian [1] Testing (Etch) Environment. The procedure will also be possible under other Linux distributions but since Maemo is built upon Debian, this approach is the most preferrable way to extend Maemo Linux. An SELinux enabled device will provide the possibility of a convenient configuration of the device. Different stakeholders can define detailled access control to the components they maintain. This ensures the interests of the stakeholders by providing the benefits of a Linux based embedded device. Keywords selinux, security, embedded system

2012-01-20

AS/NZS 4360:2004 Risk management 澳新风险管理标准

This Standard provides a generic guide for managing risk. This Standard may be applied to a very wide range of activities, decisions or operations of any public, private or community enterprise, group or individual. While the Standard has very broad applicability, risk management processes are commonly applied by organizations or groups and so, for convenience, the term ‘organization’ has been used throughout this Standard. This Standard specifies the elements of the risk management process, but it is not the purpose of this Standard to enforce uniformity of risk management systems. It is generic and independent of any specific industry or economic sector. The design and implementation of the risk management system will be influenced by the varying needs of an organization, its particular objectives, its products and services, and the processes and specific practices employed. This Standard should be applied at all stages in the life of an activity, function, project, product or asset. The maximum benefit is usually obtained by applying the risk management process from the beginning. Often a number of discrete studies are carried out at different times, and from strategic and operational perspectives. The process described here applies to the management of both potential gains and potential losses.

2012-01-20

Code of practice for information security management AS/NZS ISO/IEC 17799:2001

This Standard was prepared by the Joint Standards Australia/Standards New Zealand Committee IT-012, Information Systems, Security and Identification Technology and supersedes AS/NZS 4444.1:1999, Information security management, Part 1: Code of practice for information security management. It is identical with ISO/IEC 17799:2000, Information technology—Code of practice for information security management and differs in only very minor editorial details from AS/NZS 4444.1:1999. However the Standard number has been changed to that of the international Standard (ISO/IEC 17799) to minimize any confusion when it is used by organizations internationally. The objective of this Standard is to give recommendations for information security management for use by those who are responsible for initiating, implementing or maintaining security in their organization. It is intended to provide a common basis for developing organizational security standards and effective security management practice and to provide confidence in inter-organizational dealings. This Standard is complementary to AS/NZS 4444.2:2000, Information security management, Part 2: Specification for information security management systems (redesignated in Amendment 2 as AS/NZS 7799.2:2000) and HB 231:2000, Information security risk management guidelines. As this Standard is reproduced from an International Standard, the following applies: (a) In the source text ‘this International Standard’ should read ‘this Australian/New Zealand Standard’. (b) A full point should be substituted for a comma when referring to a decimal marker. Information is a vital asset in any organization. The protection and security of information is of prime importance to many aspects of an organization’s business. It is therefore important that an organization implements a suitable set of controls and procedures to achieve information security and manages them to retain that level of security once it is achieved. This Standard is intended for use by managers and employees who are responsible for initiating, implementing and maintaining information security within their organization and it may be considered as a basis for developing organizational security standards. A comprehensive set of controls comprising the best information security practices currently in use is provided in this Standard. This guidance is intended to be as comprehensive as possible. It is intended to serve as a single reference point for identifying the range of controls needed for most situations where information systems are used in industry and commerce and can therefore be applied by large, medium and small organizations. With increasing electronic networking between organizations there is a clear benefit in having a common reference document for information security management. It enables mutual trust to be established between networked information systems and trading partners and provides a basis for the management of these systems between users and service providers. Not all the controls described in this Standard will be relevant to every situation. It cannot take account of local environmental or technological constraints, or be present in a form that suits every potential user in an organization. Consequently this Standard might need to be supplemented by further guidance. It can be used as a basis from which, for example, a corporate policy or an inter-company trading agreement can be developed. The guidance and recommendations provided throughout this Standard should not be quoted as if they were specifications. In particular, care should be taken to ensure that claims of compliance are not misleading. It has been assumed in the drafting of this Standard that the execution of its recommendations is entrusted to suitably qualified and experienced people.

2012-01-20

IT Baseline Protection Manual

Preface The IT Baseline Protection Manual contains standard security safeguards, implementation advice and aids for numerous IT configurations which are typically found in IT systems today. This information is intended to assist with the rapid solution of common security problems, support endeavours aimed at raising the security level of IT systems and simplify the creation of IT security policies. The standard security safeguards collected together in the IT Baseline Protection Manual are aimed at a protection requirement which applies to most IT systems. For the majority of IT systems, this considerably facilitates the task of drawing up a security policy, hitherto a labour-intensive process, by eliminating the need for extensive, and often complex, analyses of threats and probabilities of occurrence. If the manual is used, all that is required to identify security shortcomings and specify appropriate security measures is to compare the target safeguards presented here with the actual safeguards in operation. The IT Baseline Protection Manual has been created so that it can be continuously updated and extended. It is revised every six months to incorporate suggestions for improvements, additional material and reflect the latest IT developments. I would like to thank those users of the IT Baseline Protection Manual who have contributed to this version. Dr. Udo Helmbrecht

2012-01-25

Information Security Risk Management Guidelines

信息安全风险管理指导准则 AS HB231 Preface The vulnerability of today’s information society is still not sufficiently realised: Businesses, administrations and society depend to a high degree on the efficiency and security of modern information technology. In the business community, for example, most of the monetary transactions are administered by computers in the form of deposit money. Electronic commerce depends on safe systems for money transactions in computer networks. A company’s entire production frequently depends on the functioning of its data-processing system. Many businesses store their most valuable company secrets electronically. Marine, air, and space control systems, as well as medical supervision, rely to a great extent on modern computer systems. Computers and the Internet also play an increasing role in the education and leisure of minors. International computer networks are the nerves of the economy, the public sector and society. The security of these computer and communication systems is therefore of essential importance. European Commission 1998 Ever more powerful personal computers, converging technologies and the widespread use of the Internet have replaced what were modest, stand-alone systems in predominantly closed networks. Today, participants are increasingly interconnected and the connections cross national borders. In addition, the Internet supports critical infrastructures such as energy, transportation and finance and plays a major part in how companies do business, how governments provide services to citizens and enterprises and how individual citizens communicate and exchange information. The nature and type of technologies that constitute the communications and information infrastructure also have changed significantly. The number and nature of infrastructure access devices have multiplied to include fixed, wireless and mobile devices and a growing percentage of access is through “always on” connections. Consequently, the nature, volume and sensitivity of information that is exchanged has expanded substantially. As a result of increasing interconnectivity, information systems and networks are now exposed to a growing number and a wider variety of threats and vulnerabilities. OECD 2002 Information security risk management forms the basis for an assessment of an organization’s information security framework. With increasing electronic networking between organizations for a very wide range of applications, which impacts on most aspects of life in our society, there is a clear benefit in having a common set of reference documents for information security management. This enables mutual trust to be established between networked sites and trading partners and provides a basis for management of facilities between information users and service providers. Security for information systems is an essential requirement at organizational, national and international levels. This handbook was revised in 2003 to be consistent with AS/NZS 7799.2:2003. This Joint Australia/New Zealand Handbook has been prepared by Committee IT-012, Information Systems, Security and Identification Technology. This publication extends the generic work done by Committee OB/7, Risk Management to specifically address the area of information security management. Information security risk management guidelines issued by the International Organization for Standardization (ISO) as ISO/IEC TR 13335, Information technology— Guidelines for the management of IT security have been adapted to align with the Australian and New Zealand Standard AS/NZS 4360, Risk management. AS/NZS ISO/IEC 17799 establishes a code of practice for selecting information security controls (or equivalently treating information security risks). AS/NZS 7799.2 (BS 7799.2) specifies an information security management system. Both documents require that a risk assessment process is used as the basis for selecting controls (treating risks). This Handbook complements these Standards by providing additional guidance concerning management of information security risks. The guidance in this Handbook is not intended to be a comprehensive schedule of information security threats and vulnerabilities. It is intended to serve as a single reference point describing an information security risk management process suitable for most situations encountered in industry and commerce and therefore can be applied by a wide range of organizations. Not all of the steps described in the handbook are relevant to every situation, nor can they take account of local environmental or technological constraints, or be presented in a form that suits every potential user in an organization. Safety critical applications in particular will require additional consideration of factors specific to the circumstances and relevant Standards should be consulted in such cases. Consequently, these guidelines may require to be augmented by further guidance before they can be used as a basis (for example) for corporate policy or an inter-company trading agreement. It has been assumed in the drafting of these guidelines, that the execution of their provisions is entrusted to appropriately qualified and experienced people.

2012-01-25

Wi-Fi Protected Setup Specification Version 1.0h December 2006

这个就是前不久被暴露极易被黑的WPS 一键设置网络的技术详解。这个本来应该带来安全的快速介入方法,成了最不安全的协议。只因为几乎所有网络路由器供应商没有设定Lockup 锁定功能。造成居然可以被野蛮攻击。另:它的算法导致密码空间大小缩小到几个小时内能试一遍。

2012-02-06

麦考瑞大学网络安全课件 Week10

Wireless LAN Security Outline • Introduction: – Base-station / Ad-hoc • Standards – 802.11 / HiperLAN / HomeRF • 802.11 – WEP / WPA / 802.11i • WEP – Authentication / Confidentiality / Integrity • WPA / 802.11i – 4-way Handshake Protocol / TKIP / AES-CCMP / Upperlayer Authentication

2012-01-20

Guidelines for the management of IT Security Part 4

澳新信息安全标准13335——2003 / ISO标准13335——1997 第四部分:安全保障的选择 Australian Standard™ Information technology—Guidelines for the management of IT Security Part 4: Selection of safeguards

2012-01-25

麦考瑞大学网络安全课件 Week 9

Prof. Vijay Varadharajan Professor and Microsoft Chair in Computing Macquarie University Security Policies Trust Security Layer Design Security Services Placement of Security Layer Transparency / Integration / Commercial Reality Management of Security Services Management Information Base Security Management Protocols Secure Signaling Trusted Authorities Infrastructure Certification Authorities

2012-01-20

麦考瑞大学网络安全课件 Week8

Prof. Vijay Varadharajan Professor and Microsoft Chair in Computing Macquarie University Distributed Computing Client Server Model Distributed Authentication Kerberos Authorization Middleware Security DCE Security CORBA Security Web Services Security

2012-01-20

Guidelines for the management of IT Security Part 1

Guidelines for the management of IT Security Part 1: Concepts and models for IT Security

2012-01-20

Guidelines for the management of IT Security Part 5

澳新信息安全标准13335——2003 / ISO标准13335——1997 第五部分:网络安全管理指导 Australian Standard™ Information technology—Guidelines for the management of IT Security Part 5: Management guidance on network security

2012-01-25

CobiT Chapter 1 Executive Summary

Executive Summary COBIT

2012-03-20

麦考瑞大学网络安全课件 week2

CRYPTOGRAPHY Prof. Vijay Varadharajan Professor and Microsoft Chair in Computing Director: Information and Networked System Security Research Group Venkat Balakrishnan Research Scholar, INSS Research Group Macquarie University

2012-01-20

麦考瑞大学网络安全课件 Week 7

Prof. Vijay Varadharajan Professor and Microsoft Chair in Computing Macquarie University Overview Security Models Access Control Access Policies Information Flow Model Multilevel Security Model Secure System Verification Access Control in Operating Systems Security Evaluation Criteria

2012-01-20

麦考瑞大学网络安全课件 week1

把上学时的课件拉出来晒晒。 Prof. Vijay Varadharajan Professor and Microsoft Chair in Computing, Australia Macquarie University

2012-01-20

Analyzing integrity protection in the SELinux example policy

Proceedings of the 12th USENIX Security Symposium Washington, D.C., USA August 4–8, 2003

2012-01-20

Software Engineering week 1 (麦考瑞大学课件)

为了换取一点积分,把上学时的课件拿来和大家分享。

2012-01-04

Guidelines for the management of IT Security Part 2

澳新信息安全标准13335——2003 / ISO标准13335——1997 第二部分:管理与计划IT安全 Information technology—Guidelines for the management of IT Security Part 2: Managing and planning IT Security

2012-01-20

Guidelines for the management of IT Security Part 3

澳新信息安全标准13335——2003 / ISO标准13335——1997 第三部分:IT安全管理技术 Guidelines for the management of IT Security Part 3: Techniques for the management of IT Security

2012-01-20

CobiT Chapter 2 Control Objectives

Framework COBIT Framework is the basis of the COBIT approach and the foundation for all the other COBIT elements. The process model is organized into four domains: Plan and Organize, Acquire and Implement, Deliver and Support, and Monitor and Evaluate.

2012-03-20

麦考瑞大学网络安全课件 Week 3

Key Management and Authentication Symmetric Key Management Public Key Management Authentication Exchange Certification

2012-01-20

麦考瑞大学网络安全课件 Week 5

Security Architecture Vijay Varadharajan Professor and Microsoft Chair in Computing Macquarie University, Sydney, Australia

2012-01-20

麦考瑞大学网络安全课件 Week6

Traditional Views Discretionary Access Users at their discretion specify who can access what Mandatory Access Subjects and Objects have fixed security attributes that are used by the System to determine access Users cannot modify security attributes System (Sec. Admin) decides

2012-01-20

A Novel Security Risk Evaluation for Information Systems

Zaobin Gan, Jiufei Tang and Ping Wu College of Computer Science and Technology Huazhong University of Science and Technology, Wuhan, 430074, P.R. China Email: zhgan@hust.edu.cn Vijay Varadharajan Department of Computing, Macquarie University NSW 2109, Sydney, Australia Email: vijay@ics.mq.edu.au Abstract Quantitative security risk evaluation of information systems is increasingly drawing more and more attention. This paper extends the attack tree model, and proposes a new quantitative risk evaluation method .While the risk value of the leaf node (atomic attack) is quantified, the multiattribute utility theory is adopted. All algorithms are presented for each steps of this new evaluation method. In addition, a worked example is also experimented in this paper. The experimental result shows that the novel method can not only make the evaluation result more reasonable and objective, but also offer a good foundation for the implementation of the automatic evaluation tool.1

2012-01-20

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除