Security kernel

Results: 400



#Item
201Trusted computing / Cryptography / Hashing / Monolithic kernels / Next-Generation Secure Computing Base / Trusted Platform Module / Procfs / Kernel / Hash table / Computer architecture / Computing / Computer security

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: sigops.org

Language: English - Date: 2011-09-20 03:37:00
202National security / Computer network security / Secure communication / Security policy / Reference monitor / Trusted computing base / Kernel / Protection mechanism / Vulnerability / Computer security / Security / Crime prevention

A Language-Based Approach to Security Fred B. Schneider1 , Greg Morrisett1 , and Robert Harper2 2 1 Cornell University, Ithaca, NY

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-13 15:41:39
203Formal methods / Security / Büchi automaton / Computer security / State / Security policy / Kernel / Finite-state machine / Models of computation / Automata theory / Theoretical computer science

Enforceable Security Policies FRED B. SCHNEIDER Cornell University A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2001-11-26 17:13:32
204Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: mirrors.supportex.net

Language: English - Date: 2008-06-06 09:26:05
205Memory management / SLOB / Slab allocation / C dynamic memory allocation / Pointer / New / Region-based memory management / C / Allocator / Computing / Software engineering / Computer programming

A Heap of Trouble: Breaking the Linux Kernel SLOB Allocator Dan Rosenberg Virtual Security Research [removed]

Add to Reading List

Source URL: vsecurity.com

Language: English - Date: 2012-01-22 18:18:08
206Trusted computing / Next-Generation Secure Computing Base / Trusted computing base / Trusted Platform Module / Microkernel / Trustworthy computing / Kernel / Ring / Virtual machine / Computer security / Computing / Security

Nexus: A New Operating System for Trustworthy Computing Alan Shieh Dan Williams

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-12 14:33:40
207Unix / Security-Enhanced Linux / Filesystem Hierarchy Standard / Cron / Daemon / Fedora / Procfs / Linux kernel / Linux / Computing / Software / System software

Security Improvements Needed in Debian Russell Coker Internet and Security Consulting Could one person at the front please monitor the conference IRC channel and forward comments/questions to me as

Add to Reading List

Source URL: mirror.linux.org.au

Language: English - Date: 2007-02-05 07:34:22
208Computer network security / Fred B. Schneider / Year of birth missing / Kernel / Trusted computing base / Linux kernel / Operating system / Protection mechanism / Policy / Computer security / Computing / Security

LNCS[removed]Lifting Reference Monitors from the Kernel

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-12 23:57:02
209Computing / Access control / Kernel / Access control list / Principle of least privilege / Trusted computing base / Linux kernel / File system API / File system / Software / Computer security / Security

Costs of Security in the PFS File System∗ Kevin Walsh Department of Mathematics and Computer Science College of the Holy Cross [removed] Fred B. Schneider

Add to Reading List

Source URL: ecommons.library.cornell.edu

Language: English - Date: 2012-07-26 01:01:29
210Parallel computing / FreeBSD / Pipeline / Kernel / Granularity / IPsec / Computing / Concurrent computing / Thread

SMPng Network Stack Update 11 May 2006 Robert N. M. Watson Security Research Computer Laboratory University of Cambridge

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-05-13 15:51:25
UPDATE