ABSTRACT

With the increasing popularity of computer applications, particularly the development of network and database technology, information security is increasingly becoming a pressing problem, and its fundamental goal is to protect the information from the aspect of confidentiality, integrity, and availability. It increasingly becomes an indispensable tool to use the computer for information collection, processing, storage, analysis, and exchange. Most information processing may be related to national military and political, economic, industrial, and commercial intelligence as well as some private data and other sensitive information. Therefore, information security of the whole system will be threatened if you do not take eective security measures. Once attacked, there will be an incalculable loss to the political, economic, military, and diplomatic intelligence of the country, as well as some user departments and individuals, making information security become increasingly prominent. In recent years, the related researches have even become hotter in IT field. Operating system access control is the key to operating system security control, which takes control of access to system resources based on identification. Access Control [1-3] is one of the most common security

policies for modern operating systems. Discretionary Access Control (DAC) has great disadvantage. DAC is usually based on the assumption that the user itself can ensure credibility of the object. However, such an assumption is often wrong which provides an opportunity for Trojan horse attacks [4-5]. Therefore, Mandatory Access Control has become the best solution for the operating system security. Mandatory Access Control uses the mandatory requirements to prevent the insecure information flow, which can be very eective to prevent Trojan horse attacks.