Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module.
Niki A. RahimiPublished in: USENIX Annual Technical Conference, FREENIX Track (2004)
Keyphrases
- linux kernel
- operating system
- network connection
- software systems
- source code
- trusted computing
- clone detection
- information security
- security requirements
- file system
- security issues
- open source
- software evolution
- analysis tool
- intrusion detection
- access control
- security mechanisms
- computer security
- trusted platform module
- security policies
- trust relationships
- network security
- relational databases
- databases
- distributed environment
- software architecture