USENIX   2004
Wall of Fame | Most Viewed USENIX-2004 Paper
13 years 1 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source236
2Download preprint from source192
3Download preprint from source175
4Download preprint from source174
5Download preprint from source165
6Download preprint from source159
7Download preprint from source150
8Download preprint from source148
9Download preprint from source141
10Download preprint from source136
11Download preprint from source130
12Download preprint from source129
13Download preprint from source121
14Download preprint from source121
15Download preprint from source119
16Download preprint from source117
17Download preprint from source116
18Download preprint from source116
19Download preprint from source112
20Download preprint from source104
21Download preprint from source97