Microkernel

Results: 368



#Item
51Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-05-06 16:45:01
52Labels and Event Processes in the Asbestos Operating System Cliff Frey† Petros Efstathopoulos∗ Maxwell Krohn† Steve VanDeBogart∗ ` ‡ Frans Kaashoek† Robert Morris†

Labels and Event Processes in the Asbestos Operating System Cliff Frey† Petros Efstathopoulos∗ Maxwell Krohn† Steve VanDeBogart∗ ` ‡ Frans Kaashoek† Robert Morris†

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-08-17 14:44:03
53GFA Label Criteria: Carriers xxx Criterion ID  STRATEGY

GFA Label Criteria: Carriers xxx Criterion ID STRATEGY

Add to Reading List

Source URL: www.greenfreightasia.org

Language: English - Date: 2015-01-06 00:01:51
    54L4 microkernel family / Checklist

    Evidence for compliance with timber procurement requirements, Annex II Categorie B evidence Appendix 2 to Annex II (separate) Checklist 2: Legal timber source information

    Add to Reading List

    Source URL: www.inkoopduurzaamhout.nl

    Language: English - Date: 2014-06-02 09:50:19
    55GFA Label Criteria: Carriers xxx Criterion ID  STRATEGY

    GFA Label Criteria: Carriers xxx Criterion ID STRATEGY

    Add to Reading List

    Source URL: greenfreightasia.org

    Language: English - Date: 2015-01-06 00:01:51
      56Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

      Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2011-03-01 06:45:15
      57Custom Kernel Mode Network Solutions from JW Secure Generally, software applications avoid the use of custom kernel mode code due to the danger that poorly written code will cause the computer to crash. Strictly, the onl

      Custom Kernel Mode Network Solutions from JW Secure Generally, software applications avoid the use of custom kernel mode code due to the danger that poorly written code will cause the computer to crash. Strictly, the onl

      Add to Reading List

      Source URL: www.jwsecure.com

      Language: English - Date: 2014-12-16 20:20:22
      58ISSUE 27 | SEPTEMBERNICTANews INSIDE  Board

      ISSUE 27 | SEPTEMBERNICTANews INSIDE Board

      Add to Reading List

      Source URL: www.nicta.com.au

      Language: English - Date: 2015-02-08 20:31:45
      59AREA  PRODUCTS DATA SOURCE  D

      AREA PRODUCTS DATA SOURCE D

      Add to Reading List

      Source URL: marine.copernicus.eu

      Language: English - Date: 2015-05-05 05:06:36
      60Why panic()? Improving Reliability with Restartable File Systems Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift Computer Sciences Dep

      Why panic()? Improving Reliability with Restartable File Systems Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift Computer Sciences Dep

      Add to Reading List

      Source URL: www.sigops.org

      Language: English - Date: 2009-09-28 22:39:21