Sciweavers

314 search results - page 3 / 63
» ITOSS: An Integrated Toolkit For Operating System Security
Sort
View
SAFECOMP
2007
Springer
13 years 12 months ago
A Comparison of Partitioning Operating Systems for Integrated Systems
In present-day electronic systems, application subsystems from different vendors and with different criticality levels are integrated within the same hardware. Hence, encapsulati...
Bernhard Leiner, Martin Schlager, Roman Obermaisse...
WISA
2007
Springer
13 years 12 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
USENIX
2001
13 years 7 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley
TRUSTBUS
2005
Springer
13 years 11 months ago
Securing Operating System Services Based on Smart Cards
The executions of operating system services based on smart cards allow one to personalize some functionalities of the operating system by using the secret information stored in a s...
Luigi Catuogno, Roberto Gassirà, Michele Ma...
MOC
2010
13 years 16 days ago
Dynamical systems method for solving nonlinear equations with monotone operators
A version of the Dynamical Systems Method (DSM) for solving ill-posed nonlinear equations with monotone operators in a Hilbert space is studied in this paper. An a posteriori stopp...
N. S. Hoang, Alexander G. Ramm