<--- Back to Details
First PageDocument Content
Computer network security / Fred B. Schneider / Year of birth missing / Kernel / Trusted computing base / Linux kernel / Operating system / Protection mechanism / Policy / Computer security / Computing / Security
Date: 2013-09-12 23:57:02
Computer network security
Fred B. Schneider
Year of birth missing
Kernel
Trusted computing base
Linux kernel
Operating system
Protection mechanism
Policy
Computer security
Computing
Security

LNCS[removed]Lifting Reference Monitors from the Kernel

Add to Reading List

Source URL: www.cs.cornell.edu

Download Document from Source Website

File Size: 54,27 KB

Share Document on Facebook

Similar Documents

IRM Enforcement of Java Stack Inspection∗ ´ Ulfar Erlingsson† Fred B. Schneider

DocID: 1unM8 - View Document

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

DocID: 1tZzw - View Document

Nexus: An Operating System for Trustworthy Computing Alan Shieh Dan Williams Kevin Walsh Emin Gün Sirer Fred B. Schneider Department of Computer Science Cornell University

DocID: 1tIiT - View Document

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

DocID: 1spbC - View Document

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

DocID: 1saFx - View Document