Solaris下基于VFS加密组件模型的研究

牟永敏, 李贝

电子学报 ›› 2006, Vol. 34 ›› Issue (S1) : 2547-2550.

PDF(426 KB)
PDF(426 KB)
电子学报 ›› 2006, Vol. 34 ›› Issue (S1) : 2547-2550.
论文

Solaris下基于VFS加密组件模型的研究

  • 牟永敏, 李贝
作者信息 +

The Model and Implement of File Enc/Decryption Based on Solaris VFS

  • MU Yong-min, LI Bei
Author information +
文章历史 +

摘要

主要分析了如何利用系统调用重定向技术,在基于Solaris的VFS(Virtual File System)构架下开发文件加密组件,并实现与操作系统的无缝工作.在简单文件加密模型的基础上作了进一步改进,提出了改进后的文件加密组件模型.结果表明,改进后的模型具有更高的效率,并且有效地降低了该模块对操作系统性能的冲击.

Abstract

On the base of analyzing how to develop file enc/decryption system based on VFS of Solaris with the technology of redirection of system call and how to make it work with OS seamlessly,the author make progress on the simple model of file enc/decryption system and gives the improved model of file enc/decryption system.The result shows that the improved model has better efficiency and reduces the impact to the OS on performance effectively.

关键词

系统调用重定向 / 文件加密 / VFS文件系统

Key words

redirection of system call / file enc/decryption / virtual file system(VFS)

引用本文

导出引用
牟永敏, 李贝. Solaris下基于VFS加密组件模型的研究[J]. 电子学报, 2006, 34(S1): 2547-2550.
MU Yong-min, LI Bei. The Model and Implement of File Enc/Decryption Based on Solaris VFS[J]. Acta Electronica Sinica, 2006, 34(S1): 2547-2550.
中图分类号: TP393.08   

参考文献

[1] Sun Microsystems.Device Driver Tutorial[M].Sun Microsystems,2005.
[2] Jim Mauro,Richard McDougall.Solaris Internals[M].Sun Microsystems Press,2000.
[3] Sun Microsystems.Writing Device Drivers[M].Sun Microsystems,2005.
[4] Sun Microsystems.Solaris Modular Debugger Guild[M].Sun Microsystems,2005.
[5] Sun Microsystems.man pages section 9:DDI and DKI Kernel Functions[M].Sun Microsystems,2005.
[6] Sun Microsystems.man pages(2):System Calls[M].Sun Microsystems,2005.
[7] Perter Van Der LinDen.Expert C Programming[M].PH PTR,2002.
[8] 汪志达,叶伟.在PC上实现对公开密钥加密密文的解密[J].计算机应用与软件,2005,22(8):144-145.Wang Zhi-da,et al.Cipher decryption of public key cryption on PC[J].The Computer Application and Software,2005,22 (8):144-145.(in Chinese)
[9] 张串绒,尹忠海,肖国镇.不使用Hash和Redundancy函数的认证加密方案[J].电子学报,2006,34(5);874-877.Zhang Chuan-rong,et al.Authenticated encryption schemes without using Hash and Redundancy functions[J].Acta Electronica Sinica,2006,34(5):874-877.(in Chinese)
[10] 顾纯祥,张亚娟,祝跃飞.混合可验证加密签名体制及应用[J].电子学报,2006,34(5):878-882.Gu Chun-xiang,Zhang Ya-juan,Zhu Yue-fei.A mixed verifiably encrypted signature scheme and it's applications[J].Acta Electronica Sinica,2006,34(5):878-882.(in Chinese)
PDF(426 KB)

1418

Accesses

0

Citation

Detail

段落导航
相关文章

/