Back to Results
First PageMeta Content
Separation kernel / Principle of least privilege / Kernel / Ring / Linux kernel / Trusted computing base / Operating system / Multilevel security / Privilege / Computer security / Computer architecture / Computing


LEAST PRIVILEGE IN SEPARATION KERNELS Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen Department of Computer Science, Naval Postgraduate School, 833 Dyer Rd., Monterey, CA USA
Add to Reading List

Document Date: 2007-11-15 12:21:15


Open Document

File Size: 468,88 KB

Share Result on Facebook

City

Princeton / Kernel / Oakland / /

Company

A A B A Resources / Military & Aerospace Electronics / James P. Anderson Co. / Ames / /

Country

United States / United Kingdom / /

Currency

STD / /

/

IndustryTerm

search processes / secure systems / separation kernel applications / communications channels / kernel technology / untrusted dirty-word search process / commodity systems / predictable processing behavior / assurance systems / vendors and integrators with tools / real-time embedded systems / dirty-word search workspace / /

OperatingSystem

UNIX system / Linux / /

Organization

National Security Agency / Department of Defense / Naval Postgraduate School / Thuy D. Nguyen Department of Computer Science / U.S. Department of Defense / /

Person

Taylor / Addison Wesley / Jim / Thuy D. Nguyen / Cynthia E. Irvine / Michael McEvilley / Levin / Schroeder / /

Position

guard / writer / quality assurance manager / T. D. / /

ProvinceOrState

South Dakota / New Jersey / California / /

PublishedMedium

Communications of the ACM / /

Technology

virtual machine / flow control / Linux / Information Technology / UNIX system / 6.2 Trusted Computing Exemplar Project Separation kernel technology / Operating Systems / /

URL

http /

SocialTag