Sciweavers

987 search results - page 27 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
IWMM
2004
Springer
92views Hardware» more  IWMM 2004»
14 years 2 months ago
Memory accounting without partitions
Operating systems account for memory consumption and allow for termination at the level of individual processes. As a result, if one process consumes too much memory, it can be te...
Adam Wick, Matthew Flatt
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 3 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
SOSP
2007
ACM
14 years 5 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
14 years 1 months ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
ISCAS
2006
IEEE
76views Hardware» more  ISCAS 2006»
14 years 2 months ago
Flexible hardware architectures for curve-based cryptography
— This paper compares implementations of elliptic and hyperelliptic curve cryptography (ECC and HECC) on an FPGA platform. We use the same low-level blocks to implement the basic...
Lejla Batina, Nele Mentens, Bart Preneel, Ingrid V...