Sciweavers

228 search results - page 3 / 46
» Usable Mandatory Integrity Protection for Operating Systems
Sort
View
USENIX
2007
13 years 7 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
FIW
2009
138views Communications» more  FIW 2009»
13 years 3 months ago
Considering Online Feature Interaction Detection and Resolution for Integrated Services in Home Network System
Abstract. This paper presents an online detection and resolution method for feature interactions among integrated services in home network systems. To achieve reasonable online det...
Masahide Nakamura, Hiroshi Igaki, Yuhei Yoshimura,...
SCOPES
2007
Springer
13 years 11 months ago
Operating system integrated energy aware scratchpad allocation strategies for multiprocess applications
Various scratchpad allocation strategies have been developed in the past. Most of them target the reduction of energy consumption. These approaches share the necessity of having d...
Robert Pyka, Christoph Faßbach, Manish Verma...
ACSAC
2009
IEEE
14 years 4 days ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
ACSAC
2009
IEEE
14 years 4 days ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...