The notion of trusted operating system was proposed to solve the security prob-lems of current security solutions. Such security solutions as intrusion detection sys-tems, firewalls have been used widely. However, they are run in the application-level of computer systems. Therefore many application-level processes including hacking programs can easily bypass them. Numerous bypassing techniques already have been released, and they reveal the weakness of those solutions. On the contrary, a trusted operating system provides security mechanisms at its kernel that is the lower level than the application-level. The application-level processes cannot bypass the kernel-level security mechanisms. In addition, the lower-level secu-rity mechanisms are...
AbstractThe privilege in the operating system (OS) often results in the break of confidentiality and...
Abstract We implement the Extended Role Based Access Control(E-RBAC) in an embedded environment. E-R...
The importance of a security operating system (OS) with security-enhancing mechanisms at the kernel ...
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be us...
Part 6: Availability, Security and PrivacyInternational audienceThe consequences of security breache...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
Application security is typically coded in the application. In kernelSec, we are investigating mecha...
As part of the general goal of providing secure computer systems, the design of verifiably secure o...
Security-enhanced Linux incorporates a strong, flex-ible mandatory access control architecture into ...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
National Security Agency Although public awareness of the need for security in computing systems is ...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
AbstractThe privilege in the operating system (OS) often results in the break of confidentiality and...
Abstract We implement the Extended Role Based Access Control(E-RBAC) in an embedded environment. E-R...
The importance of a security operating system (OS) with security-enhancing mechanisms at the kernel ...
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be us...
Part 6: Availability, Security and PrivacyInternational audienceThe consequences of security breache...
Trusted computing aims to build a trusted computing environment for information systems with the hel...
Security controls (such as encryption endpoints, payment gateways, and firewalls) rely on correct pr...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Abstract. Applications typically rely on the operating system to en-force access control policies su...
Application security is typically coded in the application. In kernelSec, we are investigating mecha...
As part of the general goal of providing secure computer systems, the design of verifiably secure o...
Security-enhanced Linux incorporates a strong, flex-ible mandatory access control architecture into ...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
National Security Agency Although public awareness of the need for security in computing systems is ...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
AbstractThe privilege in the operating system (OS) often results in the break of confidentiality and...
Abstract We implement the Extended Role Based Access Control(E-RBAC) in an embedded environment. E-R...
The importance of a security operating system (OS) with security-enhancing mechanisms at the kernel ...