<--- Back to Details
First PageDocument Content
Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software
Date: 2005-10-18 08:59:18
Trusted computing
Microkernel
Security
Trusted computing base
Kernel
Trusted path
L4 microkernel family
Next-Generation Secure Computing Base
Ring
Computer security
Computer architecture
System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Download Document from Source Website

File Size: 60,07 KB

Share Document on Facebook

Similar Documents

Geography of California / Business / Microsoft / Central Valley / Davis /  California / University of California /  Davis / Kuali Foundation / Request for proposal / Next-Generation Secure Computing Base

ADMAN Board of Directors Meeting Minutes December 17, p.mRobert Mondavi Institute, Room 1207

DocID: 1qwhJ - View Document

Health informatics / Electronic health records / Health Insurance Portability and Accountability Act / Data protection / Protected health information / Medical privacy / Next-Generation Secure Computing Base / Privacy / Medical record / Information privacy / Health Information Technology for Economic and Clinical Health Act / National Provider Identifier

DOC Document

DocID: 1p15y - View Document

information security technical report–138  available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

DocID: 1mRxb - View Document

CHAPTER  18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

DocID: 19URM - View Document

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004  Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

DocID: 18m73 - View Document