Operating system security by integrity checking and recovery using write-protected storage.
Jerzy KaczmarekMichal R. WróbelPublished in: IET Inf. Secur. (2014)
Keyphrases
- operating system
- integrity checking
- windows xp
- integrity constraints
- virtual memory
- application level
- deductive databases
- memory management
- sensitive data
- high assurance
- data storage
- computer systems
- discretionary access control
- constraint logic programming
- virtual machine
- information security
- previously mentioned
- address space
- microsoft windows
- programs written
- distributed systems
- network security
- multi tasking
- access control
- data processing
- database
- file system
- red hat
- storage devices
- windows nt
- random access
- relational databases