Sciweavers

451 search results - page 16 / 91
» Maintainability of the Linux kernel
Sort
View
88
Voted
SAC
2009
ACM
15 years 7 months ago
An implementation of the earliest deadline first algorithm in Linux
Recently, many projects have been started to introduce some real-time mechanisms into general purpose operating systems (GPOS) in order to make them capable of providing the users...
Dario Faggioli, Michael Trimarchi, Fabio Checconi
USS
2010
14 years 10 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich
106
Voted
WISA
2004
Springer
15 years 6 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
86
Voted
SIGOPS
2008
90views more  SIGOPS 2008»
15 years 16 days ago
Virtual servers and checkpoint/restart in mainstream Linux
Virtual private servers and application checkpoint and restart are two advanced operating system features which place different but related requirements on the way kernel-provided...
Sukadev Bhattiprolu, Eric W. Biederman, Serge E. H...
IEEEARES
2010
IEEE
15 years 6 months ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...