메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Even more patterns for secure operating systems

Author keywords

Operating systems; Patterns; Security; Software architectures

Indexed keywords

COMMON SOURCE; EXECUTION TIME; INTERNET-BASED SYSTEMS; MEMORY PROTECTION; OPERATING SYSTEMS; PATTERNS; PROCESS CREATION; SECURE OPERATING SYSTEM; SECURITY; SECURITY PROBLEMS; VIRTUAL ADDRESS SPACE;

EID: 67449092751     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1415472.1415484     Document Type: Conference Paper
Times cited : (8)

References (25)
  • 1
    • 67449098485 scopus 로고    scopus 로고
    • Fernandez, E. B., 2002. Patterns for operating systems access control. In Proceedings of 9th Conference on Pattern Language of Programs (PLoP 2002) (Monticello, Illinois, USA, September 8-12, 2002). PLoP 2002. http://jerry.cs.uiuc.edu/~plop/plop2002/proceedings.html
    • Fernandez, E. B., 2002. Patterns for operating systems access control. In Proceedings of 9th Conference on Pattern Language of Programs (PLoP 2002) (Monticello, Illinois, USA, September 8-12, 2002). PLoP 2002. http://jerry.cs.uiuc.edu/~plop/plop2002/proceedings.html
  • 4
    • 67449099330 scopus 로고    scopus 로고
    • Operating system access control
    • Chapter 10 Schumacher, M. Fernandez, E.B. Hybertson, D. Buschmann, F. and Sommerlad, P, J. Wiley & Sons
    • Fernandez, E. B. 2006. Operating system access control. Chapter 10 in Schumacher, M. Fernandez, E.B. Hybertson, D. Buschmann, F. and Sommerlad, P. Security Patterns: Integrating security and systems engineering, J. Wiley & Sons, 2006.
    • (2006) Security Patterns: Integrating security and systems engineering
    • Fernandez, E.B.1
  • 6
    • 67449088428 scopus 로고    scopus 로고
    • The Design of Secure Systems, under contract with Addison-Wesley
    • to appear
    • Fernandez, E. B., Gudes, E. and Olivier, M. 2009. The Design of Secure Systems, under contract with Addison-Wesley, to appear 2009.
    • (2009)
    • Fernandez, E.B.1    Gudes, E.2    Olivier, M.3
  • 8
    • 0004198635 scopus 로고    scopus 로고
    • 3rd Edition, Prentice-Hall
    • Pfleeger, C. P. 2003. Security in computing, 3rd Edition, Prentice-Hall, 2003. http://www.prenhall.com
    • (2003) Security in computing
    • Pfleeger, C.P.1
  • 10
    • 84868968014 scopus 로고    scopus 로고
    • th Conference on Pattern Language of Programs (Monticello, Illinois, USA, September 11-15, 2001). PLoP 2001. http://hillside.net/plop/plop2001/
    • th Conference on Pattern Language of Programs (Monticello, Illinois, USA, September 11-15, 2001). PLoP 2001. http://hillside.net/plop/plop2001/
  • 12
    • 0003798252 scopus 로고    scopus 로고
    • 3rd Ed, Addison-Wesley
    • Nutt, G. 2003. Operating systems (3rd Ed.), Addison-Wesley, 2003.
    • (2003) Operating systems
    • Nutt, G.1
  • 14
    • 67449108250 scopus 로고
    • Microprocessor architecture: The 32-bit generation
    • October
    • Fernandez, E.B. 1985. Microprocessor architecture: The 32-bit generation. In VLSI Systems Design (October 1985), 34-44.
    • (1985) VLSI Systems Design , pp. 34-44
    • Fernandez, E.B.1
  • 15
    • 33646895419 scopus 로고    scopus 로고
    • Tannenbaum, A.S., Herder, J.N. and Bos, H. 2006. Can we make operating systems reliable and secure? In Computer (May 2006), IEEE, 44-51.
    • Tannenbaum, A.S., Herder, J.N. and Bos, H. 2006. Can we make operating systems reliable and secure? In Computer (May 2006), IEEE, 44-51.
  • 16
    • 84868968007 scopus 로고    scopus 로고
    • PA-RISC family
    • PA-RISC family, http://en.wikipedia.org/wiki/PA-RISC
  • 17
    • 33750947537 scopus 로고
    • AIX operating system: A trustworthy computing system
    • SA23-2619, IBM Corp
    • Camillone, N.A., Steves, D.H. and Witte, K.C. 1990. AIX operating system: A trustworthy computing system. In IBM RISC System/6000 Technology, SA23-2619, IBM Corp., 1990, 168-172.
    • (1990) IBM RISC System/6000 Technology , pp. 168-172
    • Camillone, N.A.1    Steves, D.H.2    Witte, K.C.3
  • 18
    • 84868979331 scopus 로고    scopus 로고
    • tth Conference of Pattern Languages of Programs (Monticello, Illinois, USA, September 3-5, 1997). PLoP 1997.
    • tth Conference of Pattern Languages of Programs (Monticello, Illinois, USA, September 3-5, 1997). PLoP 1997.
  • 19
    • 67449101635 scopus 로고    scopus 로고
    • Also Chapter 15 in Pattern Languages of Program Design, 4 (N. Harrison, B. Foote, and H. Rohnert, Eds.), Addison-Wesley, 2000.
    • Also Chapter 15 in Pattern Languages of Program Design, vol. 4 (N. Harrison, B. Foote, and H. Rohnert, Eds.), Addison-Wesley, 2000.
  • 24
    • 57049183633 scopus 로고    scopus 로고
    • Hafiz, M. and Johnson, R. 2008. Evolution of MTA Architecture: The Impact of Security. In Software: Practice and Experience (May 12, 2008), John Wiley & Sons, 2008. DOI= http://dx.doi.org/10.1002/spe.880
    • Hafiz, M. and Johnson, R. 2008. Evolution of MTA Architecture: The Impact of Security. In Software: Practice and Experience (May 12, 2008), John Wiley & Sons, 2008. DOI= http://dx.doi.org/10.1002/spe.880
  • 25
    • 67449084487 scopus 로고    scopus 로고
    • Tanenbaum-Torvalds debate, http://en.wikipedia.org/wiki/Tanenbaum- Torvalds-debate
    • Tanenbaum-Torvalds debate, http://en.wikipedia.org/wiki/Tanenbaum- Torvalds-debate


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.