Design and implementation of secure Linux kernel security functions

被引:0
|
作者
Shi, W.C.
Sun, Y.F.
Liang, H.L.
Zhang, X.F.
Zhao, Q.S.
Shan, Z.Y.
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Design and implementation of secure auditing system in Linux kernel
    Zhao, Kuo
    Li, Qiang
    Kang, Jian
    Jiang, Dapeng
    Hu, Liang
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 232 - +
  • [2] Design and Implementation of VPN Security Gateway Based on Linux Kernel 2.6
    Li, Zhou
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 357 - 360
  • [3] Design and Implementation of Split TCP in the Linux Kernel
    Jain, Rahul
    Ott, Teunis J.
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [4] SECURITY KERNEL DESIGN AND IMPLEMENTATION - AN INTRODUCTION
    AMES, SR
    GASSER, M
    SCHELL, RR
    COMPUTER, 1983, 16 (07) : 14 - 22
  • [5] Extended BLP security model based on process reliability for secure Linux kernel
    Kang, JM
    Shin, W
    Park, CG
    Lee, DI
    2001 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2001, : 299 - 303
  • [6] Linux Security Modules: General security support for the Linux kernel
    Wright, C
    Cowan, C
    Smalley, S
    Morris, J
    Kroah-Hartman, G
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 17 - 31
  • [7] MPLS Implementation for the Linux Kernel
    Maravic, Igor
    Smiljanic, Aleksandra
    2012 IEEE 13TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (HPSR), 2012,
  • [8] Design and implementation of a secure email client based on embeded Linux
    Liu, HY
    Shao, LS
    Wang, J
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 4, 2005, : 375 - 377
  • [9] Survey and Analysis of Kernel and Userspace Tracers on Linux: Design, Implementation, and Overhead
    Gebai, Mohamad
    Dagenais, Michel R.
    ACM COMPUTING SURVEYS, 2018, 51 (02)
  • [10] Design and implementation of firewall security policies using Linux iptables
    Mihalos M.G.
    Nalmpantis S.I.
    Ovaliadis K.
    Journal of Engineering Science and Technology Review, 2019, 12 (01): : 80 - 86