Sciweavers

2726 search results - page 8 / 546
» Application security support in the operating system kernel
Sort
View
SIGOPS
2008
152views more  SIGOPS 2008»
13 years 9 months ago
The Caernarvon secure embedded operating system
The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has b...
David C. Toll, Paul A. Karger, Elaine R. Palmer, S...
USENIX
2000
13 years 11 months ago
Techniques for the Design of Java Operating Systems
Language-basedextensible systems, such as Java Virtual Machines and SPIN, use type safety to provide memory safety in a single address space. By using software to provide safety, ...
Godmar Back, Patrick Tullmann, Leigh Stoller, Wils...
ACSAC
2009
IEEE
14 years 4 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
CCS
1994
ACM
14 years 1 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash
IPSN
2007
Springer
14 years 4 months ago
The RETOS operating system: kernel, tools and applications
This demonstration shows the programming development suite of the RETOS operating system for sensor networks, which provides a robust and multithreaded programming interface to ap...
Hojung Cha, Sukwon Choi, Inuk Jung, Hyoseung Kim, ...