The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Continuous Data Protection (CDP) is a recent storage technology which enables reverting the state of the storage to previous points in time. We propose four alternative architectu...
Guy Laden, Paula Ta-Shma, Eitan Yaffe, Michael Fac...
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
Operating Systems provide services that are accessed by processes via mechanisms that involve a ring transition to transfer control to the kernel where the required function is pe...