Verifying Operating System Security

citeseer.ist.psu.edu
Visit Site

A confined program is one unable to leak information to an unauthorized party or modify unauthorized resources, an essential feature of any secure component based system. A proof of correctness of EROS architecture for confinement. [ResearchIndex]

Category
EROS
Visits
198
Added
Jan 28, 2025
Rating
(38)
Rate This Site
Advertise herefrom $15.00/day  ·  RON $21.00/day