Security kernel

Results: 400



#Item
81Computing / Copyright law / Software testing / Cross-platform software / Software bug / Software release life cycle / Vulnerability / Debian / Linux kernel / Software / Software licenses / Computer security

Security in Open versus Closed Systems – The Dance of Boltzmann, Coase and Moore Ross Anderson Cambridge University, England; email Abstract. Some members of the open-source and free software commun

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-25 10:25:30
82Process / System call / Interrupt handler / Context switch / Kernel / Ring / Linux kernel / Thread / Loadable kernel module / Computer architecture / Computing / System software

Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:36:04
83Operating system / Ring / Kernel / Capability-based security / Multilevel security / Virtual machine / System software / Security / Computer security

Hardware Requirements for Secure Computer Systems: A Framework† Carl E. Landwehr Computer Science and Systems Branch Naval Research Laboratory Washington, D.C.

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:51
84Linux kernel / Aspect-oriented programming / DTrace / Oracle Linux / Linux / Loadable kernel module / SystemTap / Solaris / Ltrace / Software / Computing / Debuggers

Security Level: Ktap A New Scripting Dynamic Tracing Tool For Linux zhangwei(Jovi) LinuxCon Japan in May 2013

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2013-05-29 21:13:17
85Real-time operating systems / Monolithic kernels / Microkernel / Kernel / Ioctl / Android / Operating system / EROS / Loadable kernel module / Computer architecture / System software / Software

Verifying Security Invariants in ExpressOS Haohui Mai Edgar Pek Hui Xue Samuel T. King P. Madhusudan

Add to Reading List

Source URL: haohui.me

Language: English
86Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-09-23 22:58:53
87Capability-based security / Intel iAPX 432 / Discretionary access control / Kernel / Authorization / Capability-based addressing / Mandatory access control / Security / Computer security / Access control

On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr University of Minnesota

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:23
88Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
89Identity management / Kernel / Operating system / Ring / Capability-based security / Microsoft Access / Authorization / Mandatory access control / Security and safety features new to Windows Vista / Security / Computer security / Access control

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2002-10-18 14:01:21
90Multics / Operating system / Unix / Ring / B / Kernel / Linux kernel / System Development Corporation / Capability-based security / Computer architecture / System software / Software

NRL ReportBest Available Technologies (BATs) for Computer Security CARL

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:16
UPDATE