Cost profile of a highly assured, secure operating system.
Richard E. SmithPublished in: ACM Trans. Inf. Syst. Secur. (2001)
Keyphrases
- operating system
- security mechanisms
- application level
- computer systems
- mandatory access control
- previously mentioned
- virtual machine
- memory management
- application programs
- address space
- linux kernel
- distributed systems
- microsoft windows
- multi tasking
- windows xp
- discretionary access control
- virtual memory
- databases
- protection scheme
- windows nt
- interprocess communication
- object oriented
- database systems