• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 452
Next 10 →

The Multics Kernel Design Project

by Michael D. Schroeder, David D. Clark, Jerome H. Saltzer , 1977
"... ..."
Abstract - Cited by 40 (4 self) - Add to MetaCart
Abstract not found

Final Report of the Multics Kernel Design Project

by M. D. Schroeder, D. D. Clark, M I T/lcs/tr, Schroeder Clark, J. H. Saltzer, D. H. Wells , 1977
"... This report summarizes a three-year project to develop a sinpler version of the supervisor of the Hultics operatin S system, 80 that auditing for security certification might be feasible. The report is in four sections: A suumary of the highlights of the project, together with a complete list of pu ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This report summarizes a three-year project to develop a sinpler version of the supervisor of the Hultics operatin S system, 80 that auditing for security certification might be feasible. The report is in four sections: A suumary of the highlights of the project, together with a complete list

blank page in the original document. PART I: THE MULTICS KERNEL DESIGN PROJECT

by Schroeder Clark, J. H. Saltzer, D. H. Wells, Palo Alto California, Michael D. Schroeder, David D. Clark, Jerome H. Saltzer , 1977
"... by ..."
Abstract - Add to MetaCart
Abstract not found

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability

Engineering a Security Kernel for MULTICS

by Michael D. Schroeder - In Fifth Symposium on Operating Systems Principles , 1975
"... This paper describes a research project to engineer a security kernel for Multics, a general-purpose, remotely accessed, multiuser computer system. The goals are to identify the minimum mechanism that must be correct to guarantee computer enforcement of desired constraints on information access, to ..."
Abstract - Cited by 26 (0 self) - Add to MetaCart
This paper describes a research project to engineer a security kernel for Multics, a general-purpose, remotely accessed, multiuser computer system. The goals are to identify the minimum mechanism that must be correct to guarantee computer enforcement of desired constraints on information access

Graph embedding and extension: A general framework for dimensionality reduction

by Shuicheng Yan, Dong Xu, Benyu Zhang, Hong-jiang Zhang, Qiang Yang, Stephen Lin - IEEE TRANS. PATTERN ANAL. MACH. INTELL , 2007
"... Over the past few decades, a large family of algorithms—supervised or unsupervised; stemming from statistics or geometry theory—has been designed to provide different solutions to the problem of dimensionality reduction. Despite the different motivations of these algorithms, we present in this paper ..."
Abstract - Cited by 271 (29 self) - Add to MetaCart
Over the past few decades, a large family of algorithms—supervised or unsupervised; stemming from statistics or geometry theory—has been designed to provide different solutions to the problem of dimensionality reduction. Despite the different motivations of these algorithms, we present

The Flux OSKit: A Substrate for Kernel and Language Research

by Bryan Ford , Godmar Back , Greg Benson , Jay Lepreau , Albert Lin , Olin Shivers , 1997
"... Abstract Implementing new operating systems is tedious, costly, and often impractical except for large projects. The Flux OSKit addresses this problem in a novel way by providing clean, well-documented OS components designed to be reused in a wide variety of other environments, rather than defining ..."
Abstract - Cited by 138 (1 self) - Add to MetaCart
Abstract Implementing new operating systems is tedious, costly, and often impractical except for large projects. The Flux OSKit addresses this problem in a novel way by providing clean, well-documented OS components designed to be reused in a wide variety of other environments, rather than

Thirty Years Later: Lessons from the Multics Security Evaluation

by Paul A. Karger, Roger R. Schell - in Annual Computer Security Applications Conference (ACSAC , 2002
"... Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and current) computer systems. Considerably more important than any of the individual design and implementation flaws was the d ..."
Abstract - Cited by 34 (3 self) - Add to MetaCart
greatly enabled by the fact the Multics was designed from the start for security. However, the bottom-line conclusion was that “restructuring is essential ” around a verifiable “security kernel ” before using Multics (or any other system) in an open environment (as in today’s Internet) with the existence

Chapter 10 Security Kernels

by unknown authors
"... The security kernel approach is the single most often used technique for building a highly secure operating system. However, it does not follow that you can buy one easily, that you can build one easily, that most secure systems are based on a security kernel, or even that most people agree that the ..."
Abstract - Add to MetaCart
/45 (Schiller 1975). Another notable research security kernel is the UCLA Data Secure Unix for the PDP-11/45 and 11/70 (Popek et al. 1979). The Department of Defense, under a project called Guardian, sponsored the design and formal specification of a security kernel for Multics (Schiller 1977), but the kernel

The Duality of Memory and Communication in the Implementation of a Multiprocessor Operating System

by Michael Young, Avadis Tevanian, Richard Rashid, David Golub, Jeffrey Eppinger, Jonathan Chew, William Bolosky, David Black, Robert Baron - In Proceedings of the 11th ACM Symposium on Operating Systems Principles , 1987
"... Mach is a multiprocessor operating system being implemented at Carnegie-Mellon University. An important component of the Mach design is the use of memory objects which can be managed either by the kernel or by user programs through a message interface. This feature allows applications such as transa ..."
Abstract - Cited by 160 (8 self) - Add to MetaCart
Mach is a multiprocessor operating system being implemented at Carnegie-Mellon University. An important component of the Mach design is the use of memory objects which can be managed either by the kernel or by user programs through a message interface. This feature allows applications
Next 10 →
Results 1 - 10 of 452
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University