Security kernel

Results: 400



#Item
41Computing / ISO standards / Security / Software / Common Criteria / Cyberwarfare / Linux kernel / Kernel / Operating system / Computer security / Smart card / Toe

ICCC13 Brightsight Swieten Revised TSFI definition

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2012-09-25 07:21:09
42Software / System software / Computer architecture / Sandbox / Kernel / Systrace / Security-Enhanced Linux / Chroot / Operating system / Ptrace / Code injection / JavaScript

TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin Donald E. Porter

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2011-03-07 14:32:49
43

Revisiting iOS Kernel (In)Security: Attacking the Early Random PRNG Tarjei Mandt CanSecWest 2014

Add to Reading List

Source URL: www.mista.nu

Language: English - Date: 2016-01-01 16:53:49
    44Standards organizations / OSGi / Smartphones / Software architecture / Apache Felix / Android / Security token / Kernel / X Window System / Communications protocol / Component-based software engineering / Operating system

    Smart and Secure Cross-Device Apps for the Internet of Advanced Things Christoph Busold1 , Stephan Heuser1 , Jon Rios1 , Ahmad-Reza Sadeghi2 , and N. Asokan3 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:46
    45

    A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

    Add to Reading List

    Source URL: faculty.cs.tamu.edu

    Language: English - Date: 2012-08-27 12:48:50
      46Software / System software / Utility software / Computer network security / Intrusion detection systems / Wireless networking / Deep packet capture / Computer security / Snort / Packet analyzer / Suricata / Wireshark

      Kernel packet capture technologies Éric Leblond Stamus Networks October 1, 2015

      Add to Reading List

      Source URL: home.regit.org

      Language: English - Date: 2015-10-01 09:35:59
      47Computer security / Computer access control / Information theory / Access control / Mandatory access control / BellLaPadula model / Trusted Computing / Trusted computing base / Principle of least privilege / Information flow / Security kernel

      A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

      Add to Reading List

      Source URL: cisr.nps.edu

      Language: English - Date: 2008-08-18 13:41:12
      48Dark web / Internet security / Secure communication / Tor / Pages / Linux kernel

      From: Andrew Lewman, Executive Director To: The Tor Community Date: September 15, 2011 This report documents progress in August 2011.

      Add to Reading List

      Source URL: archive.torproject.org

      Language: English - Date: 2011-09-15 09:57:02
      49Software / Computer architecture / System software / Computing platforms / Smartphones / Cross-platform software / Alphabet Inc. / Android / Linux namespaces / Mobile security / Kernel / Namespace

      PINPOINT: Efficient & Effective Resource Isolation for Mobile Security & Privacy Paul Ratazzi, Ashok Bommisetti, Nian Ji, and Prof. Wenliang (Kevin) Du Department of Electrical Engineering & Computer Science

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2015-06-05 20:26:09
      50Computing / Software / Internet / Internet security / Dark web / Secure communication / Tor / The Tor Project /  Inc / Linux kernel / Vidalia

      From: Andrew Lewman, Executive Director To: the tor community Date: June 8, 2011 This report documents progress in May 2011.

      Add to Reading List

      Source URL: archive.torproject.org

      Language: English - Date: 2011-09-15 09:57:06
      UPDATE