Security kernel

Results: 400



#Item
381Gentoo Linux / Hardened Gentoo / Security-Enhanced Linux / Grsecurity / Mandatory access control / RSBAC / Access control list / Linux Security Modules / Type enforcement / Computer security / System software / Access control

SELinux and grsecurity: A Case Study Comparing Linux Security Kernel Enhancements Michael Fox, John Giordano, Lori Stotler, Arun Thomas

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2005-08-24 18:01:26
382Real-time operating systems / Memory management / Central processing unit / Virtual machines / Access control / Capability-based security / Kernel / EROS / Ring / Computer architecture / System software / Computing

Unpublished workshop paper for RESoLVE’12 - March 3, [removed]London, UK CHERI: a research platform deconflating

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2012-03-06 02:50:53
383Multiple Independent Levels of Security / Multilevel security / Software engineering / Common Object Request Broker Architecture / Computer security / General Inter-ORB Protocol / Separation kernel / Kernel / Partitioning Communication System / CORBA / Computing / Security

The MILS Architecture for a Secure Global Information Grid Dr. W. Scott Harrison, Dr. Nadine Hanebutte, Dr. Paul W. Oman, and Dr. Jim Alves-Foss

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-11-04 23:48:42
384National security / Programming language implementation / Virtual machine / VM / Kernel / Ring / Operating system / Computer security / Multics / System software / Software / Crime prevention

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2007-08-22 14:16:11
385Simplified Mandatory Access Control Kernel / Security-Enhanced Linux / Mandatory access control / AppArmor / Type enforcement / File system / Operating system / Access control list / Extended file attributes / Computer security / System software / Software

PDF Document

Add to Reading List

Source URL: www.linuxsymposium.org

Language: English - Date: 2008-07-17 18:19:06
386Computer network security / Access control / Capability-based security / Computer security / Kernel / Object-capability model / Operating system / Programming language / Linux kernel / Computing / Computer architecture / Security

PDF Document

Add to Reading List

Source URL: www.info.ucl.ac.be

Language: English - Date: 2004-12-03 12:46:43
387Windows NT architecture / Kernel / Real-time operating systems / Capability-based security / Operating system / Object Manager / Ring / PSOS / Multilevel security / Computer security / Security / Computer architecture

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2003-07-16 12:45:30
388Trusted computing base / Kernel / Separation kernel / Multilevel security / Operating system / Ring / Linux kernel / Unix / Security-Enhanced Linux / Computer architecture / Computer security / System software

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2007-01-23 13:43:40
389Trusted computing base / Separation kernel / Kernel / Operating system / Multilevel security / Linux kernel / Ring / Unix / Server / Computer architecture / System software / Computer security

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2004-05-25 18:32:46
390National security / Computer network security / Secure communication / Trusted computing base / Reference monitor / Security policy / Protection mechanism / Kernel / Vulnerability / Computer security / Security / Crime prevention

PDF Document

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2001-06-25 19:24:15
UPDATE