Security kernel

Results: 400



#Item
351Real-time operating systems / Memory management / Central processing unit / Virtual machines / Access control / Capability-based security / Kernel / EROS / Ring / Computer architecture / System software / Computing

Unpublished workshop paper for RESoLVE’12 - March 3, [removed]London, UK CHERI: a research platform deconflating

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2012-02-11 17:01:45
352Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-06-06 09:26:05
353Memory management / Real-time operating systems / Central processing unit / Kernel / Ring / Multics / Operating system / Capability-based security / Microkernel / System software / Computer architecture / Software

Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2011-02-22 19:36:24
354Chroot / FreeBSD jail / Operating system-level virtualization / FreeBSD / Unix security / Procfs / Operating system / Securelevel / Kernel / System software / Software / Unix

Jails: Confining the omnipotent root. Poul-Henning Kamp Robert N. M. Watson

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2004-01-01 14:02:41
355Mach / Mac OS X / Mandatory access control / Computing platforms / Kernel / FreeBSD / Loadable kernel module / FLASK / Darwin / Computer security / Computing / Computer architecture

The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 Robert Watson Network Associates Laboratories Rockville, MD

Add to Reading List

Source URL: www.trustedbsd.org

Language: English - Date: 2014-02-25 09:35:54
356Systrace / Computer security / Unix / Kernel / System call / Operating system / Principle of least privilege / Microkernel / Chroot / System software / Software / Computer architecture

Improving Host Security with System Call Policies Niels Provos Center for Information Technology Integration

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2003-08-09 19:06:41
357Real-time operating systems / Memory management / Central processing unit / Virtual machines / Access control / Capability-based security / Kernel / EROS / Ring / Computer architecture / System software / Computing

Unpublished workshop paper for RESoLVE’12 - March 3, [removed]London, UK CHERI: a research platform deconflating

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-03-17 19:25:43
358Embedded Linux / Smartphones / Cloud clients / Android / Linux / Security-Enhanced Linux / Mandatory access control / Linux kernel / Motorola Droid / Software / Computing / Computer security

Laying a Secure Foundation for Mobile Devices Stephen Smalley

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-04-25 23:08:31
359Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components —

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2004-08-02 05:13:46
360Debugging / Computer security / OpenOffice.org / Linux kernel / Software / Software bug / Software testing

A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 Each Claire Le Goues

Add to Reading List

Source URL: dijkstra.cs.virginia.edu

Language: English - Date: 2012-03-29 15:12:55
UPDATE