Security kernel

Results: 400



#Item
51Internet security / Libevent / Linux kernel / Tor / Firefox

From: Andrew Lewman, Executive Director To: the tor community Date: April 10, 2011 This report documents progress in January 2011.

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2011-09-15 09:57:03
52FreeBSD / Qmail / Privilege escalation / Computer security / Berkeley Software Distribution / Kernel / Exploit / Linux kernel / Software bug

What is a Security Flaw? Colin Percival Colin Percival

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2006-05-14 06:23:45
53Computing / Cyberwarfare / Computer network security / Computer networking / OpenFlow / Network architecture / Software-defined networking / Nox / Firewall / Computer network / Computer security / Denial-of-service attack

A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
54Software / Free software / Computing / Dark web / Internet security / Secure communication / Tor / I2P / Linux kernel

From: Andrew Lewman, Executive Director To: the tor community Date: May 7, 2011 This report documents progress in April 2011.

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2011-09-15 09:57:02
55OpenFlow / Nox / Cloud infrastructure / Cloud computing / Kernel / Network architecture

Security  as  an  App  and   Security  as  a  Service:     New  Killer  Applica6ons  for   So9ware  Defined  Networking?   Guofei  Gu   SUCCESS  Lab  

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2012-12-15 13:47:45
56Computer security / Computer architecture / Computing / Multilevel security / Multiple Independent Levels of Security / Separation kernel / Lynx Software Technologies / Kernel / Lockheed Martin / MLS / Guard / Protection ring

PDF Document

Add to Reading List

Source URL: swa.omg.org

Language: English - Date: 2006-12-14 08:55:42
57Network performance / Computing / Computer architecture / Software / Network socket / Network congestion / TCP congestion control / Transmission Control Protocol / Tor / Packet loss / Linux kernel / Scheduling

PDF Document

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2014-10-09 10:44:05
58Cross-platform software / Evaluation / Software testing / Data security / Common Criteria / Kernel / SQL / Evaluation Assurance Level / Cross-site scripting / Computing / Software engineering / Computer security

Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

Add to Reading List

Source URL: atsec.com

Language: English - Date: 2010-08-10 10:53:40
59Evaluation / Common Criteria / Evaluation Assurance Level / Red Hat Enterprise Linux / Security Target / Protection Profile / Linux kernel / Linux / Red Hat / Computer security / Computing / Software

Microsoft Word - HP_RHEL4_security_target-v2.4.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
60Kernel / Thread / Scheduler activations / System call / Ring / Linux kernel / Asynchronous I/O / End-to-end principle / Microkernel / Computer architecture / Computing / System software

System design issues • Systems often have many goals: - Performance, reliability, availability, consistency, scalability, security, versatility, modularity/simplicity • Designers face trade-offs:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2006-12-07 12:00:26
UPDATE