The purpose of this document is to investigate which facilities are required in a minimal kernel to provide an environment where users can be assured that certain levels of security will be enforced. Various features are discussed with reference to three minimal kernels.Chorus, VAX VMM and Alpha, are investigated and their main features described. The ability of these kernels to provide the desired environment is discussed and their shortcomings exposed. Further issues and options are then discussed to determine what other features may be incorporated to improve the level of security available to the user and more questions are raised. Finally an attempt is made to define those elements which are necessary in a kernel to enforce the level o...
In many instances of virtual machine deployments today, virtual machine instances are created to sup...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
The two major deficiencies identified and addressed in this thesis are the versatility of access rig...
This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX ...
Abstract-This paper describes the development of a virtual-machine monitor (VMM) security kernel for...
Small kernels are a promising approach to secure and reliable system construction. These systems red...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
The subject of the thesis is the design and implementation of an operating system kernel for the Cam...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
The operating system kernel serves as the root of trust for all applications running on the computer...
Various system architectures have been proposed for high assurance enforcement of multilevel securit...
Various system architectures have been proposed for high assurance enforcement of multilevel securit...
Abstract. Kernel rootkits pose a significant threat to computer systems as they run at the highest p...
The economy of mechanism security principle states that program design should be kept as small and s...
In many instances of virtual machine deployments today, virtual machine instances are created to sup...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
The two major deficiencies identified and addressed in this thesis are the versatility of access rig...
This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX ...
Abstract-This paper describes the development of a virtual-machine monitor (VMM) security kernel for...
Small kernels are a promising approach to secure and reliable system construction. These systems red...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
The subject of the thesis is the design and implementation of an operating system kernel for the Cam...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
The operating system kernel serves as the root of trust for all applications running on the computer...
Various system architectures have been proposed for high assurance enforcement of multilevel securit...
Various system architectures have been proposed for high assurance enforcement of multilevel securit...
Abstract. Kernel rootkits pose a significant threat to computer systems as they run at the highest p...
The economy of mechanism security principle states that program design should be kept as small and s...
In many instances of virtual machine deployments today, virtual machine instances are created to sup...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
The two major deficiencies identified and addressed in this thesis are the versatility of access rig...