First Page | Document Content | |
---|---|---|
Date: 2005-10-18 08:59:18Trusted computing Microkernel Security Trusted computing base Kernel Trusted path L4 microkernel family Next-Generation Secure Computing Base Ring Computer security Computer architecture System software | To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael HohmuthAdd to Reading ListSource URL: www.eros-os.orgDownload Document from Source WebsiteFile Size: 60,07 KBShare Document on Facebook |
ADMAN Board of Directors Meeting Minutes December 17, p.mRobert Mondavi Institute, Room 1207DocID: 1qwhJ - View Document | |
DOC DocumentDocID: 1p15y - View Document | |
information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htmDocID: 1mRxb - View Document | |
CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — GoldfingerDocID: 19URM - View Document | |
To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael HohmuthDocID: 18m73 - View Document |