Cooperation between independent agents depends upon establishing adegree of security. Each of the cooperating agents needs assurance that the cooperation will not endanger resources of value to that agent. In a computer system, a computational mechanism can assure safe cooperation among the system's users by mediating resource access according to desired security policy. Such a mechanism, which is called a security kernel, lies at the heart of many operating systems and programming environments.The report describes Scheme 48, a programming environment whose design is guided by established principles of operating system security. Scheme 48's security kernel is small, consisting of the call-by-value $lambda$-calculus with a fe...
International audienceThis paper presents our work concerning flexibility and protection in operating...
A separation kernel simulates a distributed environment using a single physical machine by executing...
Commodity operating systems are entrusted with providing security to the applications we use everyd...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
Application security is typically coded in the application. In kernelSec, we are investigating mecha...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
Computing systems in which the consequences of failure are very serious are termed safety-critical....
Recently, several flavours of UNIX have appeared which run on inexpensive personal computers. Furthe...
A computer protection mechanism is a set of tools for controlling the actions of computations and sa...
International audienceThis paper presents our work concerning flexibility and protection in operating...
A separation kernel simulates a distributed environment using a single physical machine by executing...
Commodity operating systems are entrusted with providing security to the applications we use everyd...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
This dissertation suggests and partially demonstrates that it is feasible to retrofit real privilege...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
Application security is typically coded in the application. In kernelSec, we are investigating mecha...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
Computing systems in which the consequences of failure are very serious are termed safety-critical....
Recently, several flavours of UNIX have appeared which run on inexpensive personal computers. Furthe...
A computer protection mechanism is a set of tools for controlling the actions of computations and sa...
International audienceThis paper presents our work concerning flexibility and protection in operating...
A separation kernel simulates a distributed environment using a single physical machine by executing...
Commodity operating systems are entrusted with providing security to the applications we use everyd...