Security kernel

Results: 400



#Item
81Security in Open versus Closed Systems – The Dance of Boltzmann, Coase and Moore Ross Anderson Cambridge University, England; email   Abstract. Some members of the open-source and free software commun

Security in Open versus Closed Systems – The Dance of Boltzmann, Coase and Moore Ross Anderson Cambridge University, England; email Abstract. Some members of the open-source and free software commun

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-25 10:25:30
82Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:36:04
83Hardware Requirements for Secure Computer Systems: A Framework† Carl E. Landwehr Computer Science and Systems Branch Naval Research Laboratory Washington, D.C.

Hardware Requirements for Secure Computer Systems: A Framework† Carl E. Landwehr Computer Science and Systems Branch Naval Research Laboratory Washington, D.C.

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:51
84Security Level:  Ktap A New Scripting Dynamic Tracing Tool For Linux zhangwei(Jovi)  LinuxCon Japan in May 2013

Security Level: Ktap A New Scripting Dynamic Tracing Tool For Linux zhangwei(Jovi) LinuxCon Japan in May 2013

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2013-05-29 21:13:17
85Verifying Security Invariants in ExpressOS Haohui Mai Edgar Pek Hui Xue Samuel T. King P. Madhusudan

Verifying Security Invariants in ExpressOS Haohui Mai Edgar Pek Hui Xue Samuel T. King P. Madhusudan

Add to Reading List

Source URL: haohui.me

Language: English
86seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-09-23 22:58:53
87On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr  University of Minnesota

On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr University of Minnesota

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:23
88Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 4 Access Control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
89Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2002-10-18 14:01:21
90NRL ReportBest Available Technologies (BATs) for Computer Security CARL

NRL ReportBest Available Technologies (BATs) for Computer Security CARL

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:16