Reducing Security Policy Size for Internet Servers in Secure Operating Systems
نویسندگان
چکیده
منابع مشابه
Operating Systems Support for Busy Internet Servers
The Internet has experienced exponential growth in the use of the World-Wide Web, and rapid growth in the use of other Internet services such as VSENET news and electronic mail. These applications qualitatively differ from other network applications in the stresses they impose on busy server systems. Unlike traditional distributed systems, Internet servers must cope with huge user communities, ...
متن کاملImproving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software
This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorit...
متن کاملOperating Systems Support for Www Servers
The explosive growth of the WWW (World Wide Web) is placing a heavy demand on servers. Thus, improving server performance is important and can be achieved by scheduling resources more efficiently in operating systems. We have proposed a CPU resource scheduling policy for improving response time of a WWW server. This policy gives preferential use of the CPU resource to any process of a server th...
متن کاملSecurity for Operating Systems
Security of computing systems is a vital topic whose importance only keeps increasing. Much money has been lost and many people’s lives have been harmed when computer security has failed. Attacks on computer systems are so common as to be inevitable in almost any scenario where you perform computing. Generally, all elements of a computer system can be subject to attack, and flaws in any of them...
متن کاملSecure Microkernel Operating Systems
This paper reviews the concepts and mechanisms used to improve security in general purpose operating systems. The evolution from makrokernels to microkernels is illustrated, showing different approaches to achieve not only (more) secure but also practical platforms for legacy software applications. The ultimate method of proving correctness by formal verification is revisited. A real-world mikr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2009
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.e92.d.2196