20 years of operating systems security

被引:0
|
作者
Gligor, VD [1 ]
机构
[1] Univ Maryland, Dept Elect Engn, College Pk, MD 20742 USA
关键词
D O I
10.1109/SECPRI.1999.766904
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Capturing the highlights of research on operating systems security as reflected by these Symposia is an unusually difficult task, which I will not attempt to undertake. Instead, I will present some highlights of two areas of operating systems security that figured prominently in some of the best research papers of these Symposia for the past twenty years.
引用
收藏
页码:108 / 110
页数:3
相关论文
共 50 条
  • [21] Security Characteristics of Commercial Minicomputer Operating Systems.
    Breutmann, B.
    Zenker, H.
    Elektronische Rechenanlagen mit Computer Praxis, 1984, 26 (02): : 89 - 94
  • [22] A security verification method for information flow security policies implemented in operating systems
    Yi, XD
    Yang, XJ
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 280 - 291
  • [23] Network security: Then and now or 20 years in 10 minutes
    Kent, S
    PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 117 - 117
  • [24] THE SOCIAL-SECURITY ACT - 20 YEARS EXPERIENCE
    CAMPBELL, DF
    JOURNAL OF ACCOUNTANCY, 1956, 102 (02): : 27 - 34
  • [25] 20 YEARS EXPERIENCE OPERATING THORACIC AORTIC-ANEURYSMS
    NOPPENEY, T
    ALTMEPPEN, H
    WELTZ, R
    REIN, J
    VONDEREMDE, J
    LANGENBECKS ARCHIV FUR CHIRURGIE, 1990, : 475 - 480
  • [26] ONLINE DYNAMIC TESTING OF SECURITY AND INTEGRITY OF OPERATING SYSTEMS.
    Kurtzberg, J.M.
    IBM Technical Disclosure Bulletin, 1974, 17 (05): : 1508 - 1512
  • [27] An Autonomic Security Monitor for Distributed Operating Systems (Invited Paper)
    Arenas, Alvaro E.
    Aziz, Benjamin
    Maj, Szymon
    Matthews, Brian
    TOWARDS A SERVICE-BASED INTERNET, 2011, 6994 : 112 - +
  • [28] Modelling security risks in real-time operating systems
    Kiszka, Jan
    Wagner, Bernardo
    2007 5TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2007, : 125 - 130
  • [29] A Survey on Resource Management and Security Issues in IoT Operating Systems
    AlDossary, Noura
    AlQahtani, Sarah
    AlUbaidan, Haya
    2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 26 - 30
  • [30] In Guards we trust: Security and Privacy in Operating Systems revisited
    Hanspach, Michael
    Keller, Joerg
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 578 - 585