Results 1 - 10
of
452
Final Report of the Multics Kernel Design Project
, 1977
"... This report summarizes a three-year project to develop a sinpler version of the supervisor of the Hultics operatin S system, 80 that auditing for security certification might be feasible. The report is in four sections: A suumary of the highlights of the project, together with a complete list of pu ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This report summarizes a three-year project to develop a sinpler version of the supervisor of the Hultics operatin S system, 80 that auditing for security certification might be feasible. The report is in four sections: A suumary of the highlights of the project, together with a complete list
Tor: The secondgeneration onion router,”
- in 13th USENIX Security Symposium. Usenix,
, 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract
-
Cited by 1229 (33 self)
- Add to MetaCart
, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability
Engineering a Security Kernel for MULTICS
- In Fifth Symposium on Operating Systems Principles
, 1975
"... This paper describes a research project to engineer a security kernel for Multics, a general-purpose, remotely accessed, multiuser computer system. The goals are to identify the minimum mechanism that must be correct to guarantee computer enforcement of desired constraints on information access, to ..."
Abstract
-
Cited by 26 (0 self)
- Add to MetaCart
This paper describes a research project to engineer a security kernel for Multics, a general-purpose, remotely accessed, multiuser computer system. The goals are to identify the minimum mechanism that must be correct to guarantee computer enforcement of desired constraints on information access
Graph embedding and extension: A general framework for dimensionality reduction
- IEEE TRANS. PATTERN ANAL. MACH. INTELL
, 2007
"... Over the past few decades, a large family of algorithms—supervised or unsupervised; stemming from statistics or geometry theory—has been designed to provide different solutions to the problem of dimensionality reduction. Despite the different motivations of these algorithms, we present in this paper ..."
Abstract
-
Cited by 271 (29 self)
- Add to MetaCart
Over the past few decades, a large family of algorithms—supervised or unsupervised; stemming from statistics or geometry theory—has been designed to provide different solutions to the problem of dimensionality reduction. Despite the different motivations of these algorithms, we present
The Flux OSKit: A Substrate for Kernel and Language Research
, 1997
"... Abstract Implementing new operating systems is tedious, costly, and often impractical except for large projects. The Flux OSKit addresses this problem in a novel way by providing clean, well-documented OS components designed to be reused in a wide variety of other environments, rather than defining ..."
Abstract
-
Cited by 138 (1 self)
- Add to MetaCart
Abstract Implementing new operating systems is tedious, costly, and often impractical except for large projects. The Flux OSKit addresses this problem in a novel way by providing clean, well-documented OS components designed to be reused in a wide variety of other environments, rather than
Thirty Years Later: Lessons from the Multics Security Evaluation
- in Annual Computer Security Applications Conference (ACSAC
, 2002
"... Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and current) computer systems. Considerably more important than any of the individual design and implementation flaws was the d ..."
Abstract
-
Cited by 34 (3 self)
- Add to MetaCart
greatly enabled by the fact the Multics was designed from the start for security. However, the bottom-line conclusion was that “restructuring is essential ” around a verifiable “security kernel ” before using Multics (or any other system) in an open environment (as in today’s Internet) with the existence
Chapter 10 Security Kernels
"... The security kernel approach is the single most often used technique for building a highly secure operating system. However, it does not follow that you can buy one easily, that you can build one easily, that most secure systems are based on a security kernel, or even that most people agree that the ..."
Abstract
- Add to MetaCart
/45 (Schiller 1975). Another notable research security kernel is the UCLA Data Secure Unix for the PDP-11/45 and 11/70 (Popek et al. 1979). The Department of Defense, under a project called Guardian, sponsored the design and formal specification of a security kernel for Multics (Schiller 1977), but the kernel
The Duality of Memory and Communication in the Implementation of a Multiprocessor Operating System
- In Proceedings of the 11th ACM Symposium on Operating Systems Principles
, 1987
"... Mach is a multiprocessor operating system being implemented at Carnegie-Mellon University. An important component of the Mach design is the use of memory objects which can be managed either by the kernel or by user programs through a message interface. This feature allows applications such as transa ..."
Abstract
-
Cited by 160 (8 self)
- Add to MetaCart
Mach is a multiprocessor operating system being implemented at Carnegie-Mellon University. An important component of the Mach design is the use of memory objects which can be managed either by the kernel or by user programs through a message interface. This feature allows applications
Results 1 - 10
of
452