Protection in programmed systems.
Protection in programmed systems.
Verifiable secure operating system software
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Virtual storage and virtual machine concepts
IBM Systems Journal
Virtual machine computing in an engineering environment
IBM Systems Journal
Architectural Support for System Protection and Database Security
IEEE Transactions on Computers
The use of hardware virtualization in the context of information security
Programming and Computing Software
Hi-index | 0.00 |
Discussed is a methodology for discovering operating system design flaws as an approach to learning system design techniques that may make possible greater data security. Input/output has been found to be involved in most of the weaknesses discovered by a study team in a particular version of the system. Relative design simplicity was found to be the source of greatest protection against penetration efforts.