<--- Back to Details
First PageDocument Content
Trusted computing base / Separation kernel / Kernel / Operating system / Multilevel security / Linux kernel / Ring / Unix / Server / Computer architecture / System software / Computer security
Date: 2004-05-25 18:32:46
Trusted computing base
Separation kernel
Kernel
Operating system
Multilevel security
Linux kernel
Ring
Unix
Server
Computer architecture
System software
Computer security

Add to Reading List

Source URL: www.csl.sri.com

Download Document from Source Website

File Size: 76,25 KB

Share Document on Facebook

Similar Documents

Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

DocID: 1qCHd - View Document

Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

DocID: 1qe75 - View Document

Multilevel security / John Rushby / Lynx Software Technologies / Milliradian / Mill / Assurance services / Computing / Software / Technology

MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011 Abstract

DocID: 1pV0t - View Document

National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Multilevel security / Linux kernel / File system permissions

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

DocID: 1pekr - View Document

MULTILEVEL SECURITY CHAPTER 8 IN SECURITY ENGINEERING AMIR SHWARTZ 1

DocID: 1lfak - View Document