Separation kernel

Results: 33



#Item
21Crime prevention / National security / Evaluation / XTS-400 / Mandatory access control / Multilevel security / Multiple Independent Levels of Security / Separation kernel / Linux kernel / Computer security / Security / Computing

Microsoft Word - DISTPG.doc

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2006-09-28 10:43:57
22Windows NT architecture / Formal methods / Memory management / Separation kernel / Formal verification / Kernel / Microkernel / Object Manager / C dynamic memory allocation / Computer architecture / System software / Software

Proving Memory Separation in a Microkernel by Code Level Verification Holger Blasum and Sergey Tverdyshev Thorsten Bormer Christoph Baumann Karlsruhe Institute of Technology, SYSGO AG, Klein-Winternheim, Germany

Add to Reading List

Source URL: www-wjp.cs.uni-saarland.de

Language: English - Date: 2012-10-16 07:23:41
23Monolithic kernels / Microkernel / Kernel / Separation kernel / Formal methods / Linux kernel / Operating system / Operating system kernels / Hybrid kernel / Computer architecture / Software / System software

The University of York Department of Computer Science Submitted in part fulfilment for the degree of MSc in Software Engineering.

Add to Reading List

Source URL: andrius.velykis.lt

Language: English - Date: 2014-04-07 06:29:40
24Scheduling algorithms / Scheduling / Linux / Microkernel / Kernel / Separation kernel / Linux kernel / Process identifier / Architecture of Windows NT / Computer architecture / System software / Software

Formal Modelling of Separation Kernel Components Andrius Velykis and Leo Freitas University of York, UK [removed], [removed]

Add to Reading List

Source URL: andrius.velykis.lt

Language: English - Date: 2014-04-07 06:29:41
25Separation kernel / Thread / Linux kernel / Operating system / Cell / Mach / Ring / Computer architecture / Computing / Kernel

Formal Construction of the Mathematically Analyzed Separation Kernel W. Martin P. White E S. Taylor

Add to Reading List

Source URL: www.agoldberg.org

Language: English - Date: 2008-11-03 13:00:20
26System software / User identifier / Group identifier / Setuid / Filesystem permissions / Principle of least privilege / Privilege separation / Linux kernel / System call / Unix / Software / Computing

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-10-18 17:59:35
27Access Control Matrix / Discretionary access control / HRU / Role-based access control / Authorization / Separation of mechanism and policy / Multilevel security / Kernel / Mandatory access control / Computer security / Security / Access control

Access Control: Policies, Models, and Mechanisms Pierangela Samarati1 and Sabrina De Capitani di Vimercati2 1

Add to Reading List

Source URL: spdp.di.unimi.it

Language: English - Date: 2012-12-10 09:50:04
28Separation kernel / Principle of least privilege / Kernel / Ring / Linux kernel / Trusted computing base / Operating system / Multilevel security / Privilege / Computer security / Computer architecture / Computing

LEAST PRIVILEGE IN SEPARATION KERNELS Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen Department of Computer Science, Naval Postgraduate School, 833 Dyer Rd., Monterey, CA USA

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2007-11-15 12:21:15
29Evaluation / Integrity / Separation kernel / Kernel / Common Criteria / Green Hills Software / Linux kernel / Protection Profile / Operating system / Computer architecture / Software / System software

Green Hills Software INTEGRITY-178B Separation Kernel Security Target

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2011-11-01 17:11:41
30Multiple Independent Levels of Security / Multilevel security / Software engineering / Common Object Request Broker Architecture / Computer security / General Inter-ORB Protocol / Separation kernel / Kernel / Partitioning Communication System / CORBA / Computing / Security

The MILS Architecture for a Secure Global Information Grid Dr. W. Scott Harrison, Dr. Nadine Hanebutte, Dr. Paul W. Oman, and Dr. Jim Alves-Foss

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-11-04 23:48:42
UPDATE