Security kernel

Results: 400



#Item
221Embedded Linux / Smartphones / Android / Linux kernel / Sandbox / Lookout Mobile Security / X Window System / Security-Enhanced Linux / Software / System software / Computing

Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-04-23 16:59:54
222Android / Embedded Linux / Smartphones / Mandatory access control / Dalvik / Sandbox / Linux kernel / Privilege escalation / Operating system / Software / System software / Computing

The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2012-02-16 19:38:59
223Android / Smartphones / Embedded Linux / Cloud clients / Dalvik / Operating system / Mobile operating system / Sandbox / Linux kernel / Software / System software / Computing

Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2012-08-30 23:24:59
224Embedded Linux / Smartphones / National Security Agency / Security-Enhanced Linux / Mandatory access control / Android / Linux kernel / Motorola Droid / Privilege escalation / Software / Computing / Computer security

Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: www.incose-cc.org

Language: English - Date: 2013-08-29 11:50:21
225Software bugs / Software testing / Cross-platform software / Hacking / Vulnerability / Debian / Linux kernel / Bash / Software / Computing / Computer architecture

Protect your business from the bash bug There has been considerable media coverage about the bash bug. This includes reports from software security firms that hackers are using the bug to target Australian companies.

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-01-23 10:38:34
226Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
227Embedded operating systems / NetBSD / Application programming interfaces / Cross-platform software / Kernel / Operating system / Veriexec / Linux Security Modules / Thread / Software / System software / Computing

Recent Security Enhancements in NetBSD

Add to Reading List

Source URL: www.netbsd.org

Language: English - Date: 2006-10-22 09:02:01
228Virtual machines / Computer security / Malware / Rootkit / Monolithic kernels / Hypervisor / Kernel / Loadable kernel module / Ring / System software / Software / Linux kernel

Hello rootKitty: A lightweight invariance-enforcing framework Francesco Gadaleta, Nick Nikiforakis, Yves Younan, and Wouter Joosen IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:07
229Cross-platform software / National Security Agency / Security-Enhanced Linux / Fedora Project / Linux / Type enforcement / Fedora / Linux kernel / Debian / Software / System software / Computing

Security-Enhanced Linux - User Guide

Add to Reading List

Source URL: docs.fedoraproject.org

Language: English - Date: 2014-12-09 11:06:10
230System software / Access control / Security / Identity management / Password / Loadable kernel module / Registered user

Managing access to IMI 1. WHO CAN MANAGE ACCESS TO IMI? 2

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-10-09 04:23:57
UPDATE