Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mechanisms are oriented towards providing authorization properties, and this goal drives the design of permissions and protection mechanisms. The resulting system is dynamic, allowing the set of permissions for a program to evolve during program execution. This reduces the need for users and applications to be aware of protection mechanism, since the protection mechanism provides the user with more freedom in how they do things. We explore these properties through a number of examples. KernelSec also supports a group (role) mechanism which can define constrained groups...
The main objective of this work is to analyze and extend security model of mobile devices running on...
This paper makes two primary contributions toward establishing support for application-specific fact...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Scalable distributed systems, systems whose processing power remains proportional to the number of c...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
The notion of trusted operating system was proposed to solve the security prob-lems of current secur...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
Cooperation between independent agents depends upon establishing adegree of security. Each of the ...
We describe a new design for authorization in operating systems in which applications are first-clas...
Operating system kernels isolate applications from other malicious software via protected memory cr...
This paper makes two main contributions towards estab-lishing support for application-specific facto...
The main objective of this work is to analyze and extend security model of mobile devices running on...
This paper makes two primary contributions toward establishing support for application-specific fact...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Scalable distributed systems, systems whose processing power remains proportional to the number of c...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
The notion of trusted operating system was proposed to solve the security prob-lems of current secur...
Security is an essential feature and foremost concern to enterprise software systems. Today, applica...
Cooperation between independent agents depends upon establishing adegree of security. Each of the ...
We describe a new design for authorization in operating systems in which applications are first-clas...
Operating system kernels isolate applications from other malicious software via protected memory cr...
This paper makes two main contributions towards estab-lishing support for application-specific facto...
The main objective of this work is to analyze and extend security model of mobile devices running on...
This paper makes two primary contributions toward establishing support for application-specific fact...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...