翻訳と辞書
Words near each other
・ Trusted Computing Group
・ Trusted Data Format
・ Trusted Email Open Standard
・ Trusted execution environment
・ Trusted Execution Technology
・ Trusted Information Systems
・ Trusted Internet Connection
・ Trusted Like the Fox
・ Trusted Media Brands, Inc.
・ Trusted Mole
・ Trusted Network Connect
・ Trusted operating system
・ Trusted path
・ Trusted Platform Module
・ Trusted service manager
Trusted Solaris
・ Trusted Sources
・ Trusted Storage specification
・ Trusted system
・ Trusted third party
・ Trusted time
・ Trusted timestamping
・ TrustedID
・ TrustedSource
・ Trustee
・ Trustee (disambiguation)
・ Trustee Act 1925
・ Trustee Act 2000
・ Trustee de son tort
・ Trustee from the Toolroom


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Trusted Solaris : ウィキペディア英語版
Trusted Solaris
Trusted Solaris is a security-evaluated operating system based on Solaris by Sun Microsystems, featuring a mandatory access control model.
Parts of Trusted Solaris:
*Accounting
*Role-Based Access Control
*Auditing
*Device Allocation
*Mandatory Access Control Labeling
Trusted Solaris 8 is Common Criteria certified at Evaluation Assurance Level EAL4+ against the CAPP, RBACPP, and LSPP protection profiles. It is the basis for the DoDIIS Trusted Workstation program. 〔 (【引用サイトリンク】 publisher = Sun Microsystems )

==Solaris Trusted Extensions==
Certain Trusted Solaris features, such as fine-grained privileges, are now part of the standard Solaris 10 release. The Solaris 10 11/06 update has added a component called Solaris Trusted Extensions which gives Solaris 10 the additional features necessary to position it as the successor to Trusted Solaris. Inclusion of these features in the mainstream Solaris release marks a significant change from Trusted Solaris, as it is no longer necessary to use a different Solaris release with a modified kernel for labeled security environments. Solaris Trusted Extensions is an OpenSolaris project.
Solaris Trusted Extensions enforce a mandatory access control policy on all aspects of the operating system, including device access, file, networking, print and window management services. This is achieved by adding sensitivity labels to objects, thereby establishing explicit relationships between these objects. Only appropriate (and explicit) authorization allows applications and users read and/or write access to the objects.
The component also provides labeled security features in a desktop environment. Apart from extending support for the Common Desktop Environment from the Trusted Solaris 8 release, it delivers the first labeled environment based on GNOME.〔(【引用サイトリンク】 publisher = Sun Microsystems )
〕 Solaris Trusted Extensions facilitate the access of data at multiple classification levels through a single desktop environment.
Solaris Trusted Extensions also delivers labeled device access, and labeled network communication (through the CIPSO standard).
Commercial Internet Protocol Security Option is used to pass security information within and between labeled zones.
Solaris Trusted Extensions complies with the Federal Information Processing Standards (FIPS).

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Trusted Solaris」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.