Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Computer security
C++: an introduction to data structures
C++: an introduction to data structures
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
Security in Computing (4th Edition)
Security in Computing (4th Edition)
Operating Systems, Third Edition
Operating Systems, Third Edition
Operating Systems Concepts
Evolution of the MTA architecture: the impact of security
Software—Practice & Experience
Patterns for the secure and reliable execution of processes
Proceedings of the 15th Conference on Pattern Languages of Programs
Patterns for access control in distributed systems
Proceedings of the 14th Conference on Pattern Languages of Programs
Applicability of security patterns
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Hi-index | 0.00 |
An operating system (OS) interacts with the hardware and supports the execution of all the applications. As a result, its security is very critical. Many of the reported attacks to Internetbased systems have occurred through the OS (kernel and utilities). The security of individual execution time actions such as process creation, memory protection, and the general architecture of the OS are very important and we have previously presented patterns for these functions. We present here patterns for the representation of processes and threads, emphasizing their security aspects. Another pattern considers the selection of virtual address space structure. We finally present a pattern to control the power of administrators, a common source of security problems.