In this dissertation the integrated and privilege - role extended unix operating system security model , which is based on the blp model , is discussed 在对blp模型进行分析的基础上,提出了以blp模型为基础的完整性和特权角色扩展的unix操作系统安全模型。
Previously , he was involved in writing fiber channel device drivers and developing network processor applications , as well as maintaining unix operating systems 以前,他从事的是编写光纤通道设备驱动程序和开发网络处理器应用程序,以及维护unix操作系统。
It has been closely associated with the unix operating system where it was developed , since both the system and most of the programs that run on it are written in c 当它开发的时候是紧密的与unix系统结合在一起,直到系统和大多数在上面运行的程序都是用c写的
More and more websphere applications are being migrated from a traditional unix operating system to linux for lower costs with similar performance 越来越多的websphere应用程序正在由传统的unix os向linux迁移,因为这样可以通过更少的费用而获得近乎同样的性能。
This dissertation is focus on the research of the model of secure operating system and the implementation architecture of the security policy on unix operating system platform 本文以unix操作系统为平台,重点对安全操作系统模型和安全策略实现结构进行了研究。
The berkeley software distribution family of operating systems can be traced back to the bsd unix operating system created and maintained at the university of california , berkeley , since the late 1970s Berkeley software distribution ( bsd )系列操作系统的历史向前可以追溯到20世纪70年代后期由加利福尼亚大学berkeley创建和维护的bsd unix操作系统。
In addition , the logical partitioning lpar capability of pseries servers makes it possible to run one or more instances of linux along with aix , ibms award - winning unix operating system , on a singler server 另外, pseries服务器所具有的逻辑分区( lpar )能力使它可以在一台服务器上在运行aix ( ibm获奖的操作系统)的同时,再运行一个或多个linux实例。
After the analysis of the typical instance of the security attack on the unix operating system , it can be concluded that the discretionary accessing mechanism and the implementation of the privileged super - user are both the source of the security problems of the unix 本文通过重点分析针对unix操作系统的一些攻击实例,指出现有的unix操作系统自主访问机制和超级用户特权实现方式是最主要的安全问题。