Ring system

Results: 776



#Item
101Scotchlite / Clothing / Fashion / Shoulder strap

BACK-ROLLER PLUS Release handle for mounting and releasing the QL2 system, carrying handle Additional fastening with strap, buckle and D-ring

Add to Reading List

Source URL: www.therandonneeshop.com

Language: English - Date: 2009-11-07 11:58:20
102Operating system / Interrupt / Kernel / System call / Ring / Direct memory access / Transmission Control Protocol / INT / Process management / Computer architecture / Interrupts / X86 instructions

Version 1.0 Communication, Interrupts and Protection David May: March 24, 2014 Communication and Input-Output

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-25 07:06:21
103University of California /  Berkeley / Computer / Kernel / California / Electronics / United States / Operating system / Ring / Advanced Micro Devices

20th International Conference on Architectural Support for Programming Languages and Operating Systems March 14-18, 2015, Istanbul, TURKEY PROGRAM l

Add to Reading List

Source URL: asplos15.bilkent.edu.tr

Language: English - Date: 2015-03-14 10:58:14
104Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-09-23 22:58:53
105Operating system / Interrupt / Kernel / System call / Ring / Direct memory access / Transmission Control Protocol / INT / Process management / Computer architecture / Interrupts / X86 instructions

Version 1.0 Communication, Interrupts and Protection David May: March 24, 2014 Communication and Input-Output

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-25 07:06:21
106National security / Public safety / National Security Agency / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Ring / Information security / Database security / Computer security / Security / Crime prevention

To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:31:33
107Database management systems / Multilevel security / Data management / Security / Replication / Database / Ring / Data dictionary / Operating system / Computer security / Computing / Data

A Practical Approach to High Assurance Multilevel Secure Computing Service To appear, Proc.10th Annual

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:27
108Identity management / Kernel / Operating system / Ring / Capability-based security / Microsoft Access / Authorization / Mandatory access control / Security and safety features new to Windows Vista / Security / Computer security / Access control

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2002-10-18 14:01:21
109Process / Instruction set architectures / Interrupt handler / Kernel / Operating system / Thread / Interrupt flag / INT / Ring / Computer architecture / Interrupts / X86 instructions

KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels John Criswell, Nathan Dautenhahn, and Vikram Adve Department of Computer Science University of Illinois at Urbana-Champaign Email: {criswell,d

Add to Reading List

Source URL: sva.cs.illinois.edu

Language: English - Date: 2014-03-30 11:43:41
110Secure state / Multics / Ring / XTS-400 / Trusted system / Computer security / Security / Bell–LaPadula model

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:56
UPDATE