20 years of operating systems security

被引:0
|
作者
Gligor, VD [1 ]
机构
[1] Univ Maryland, Dept Elect Engn, College Pk, MD 20742 USA
关键词
D O I
10.1109/SECPRI.1999.766904
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Capturing the highlights of research on operating systems security as reflected by these Symposia is an unusually difficult task, which I will not attempt to undertake. Instead, I will present some highlights of two areas of operating systems security that figured prominently in some of the best research papers of these Symposia for the past twenty years.
引用
收藏
页码:108 / 110
页数:3
相关论文
共 50 条
  • [41] 20 years operating experience with brackish water RO - A case study
    Kadaj, R
    AlHumaidan, SO
    WATER SUPPLY PUZZLE: HOW DOES DESALTING FIT IN?, 1996, : 71 - +
  • [42] Intelligent computer-aided design systems: Past 20 years and future 20 years
    Tomiyama, Tetsuo
    AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, 2007, 21 (01): : 27 - 29
  • [43] Computational and systems neuroscience: The next 20 years
    Summerfield, Christopher
    Miller, Kevin
    PLOS BIOLOGY, 2023, 21 (09)
  • [44] Proposals of low cost and high security international business operating systems
    Kodama, Mitsuhara
    Umezaki, Taizo
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 89 - 94
  • [45] An Intelligent Approach to Automated Operating Systems Log Analysis for Enhanced Security
    Johnphill, Obinna
    Sadiq, Ali Safaa
    Kaiwartya, Omprakash
    Aljaidi, Mohammad
    INFORMATION, 2024, 15 (10)
  • [47] A security architecture for adapting multiple access control models to operating systems
    Kim, Jung-Sun
    Lee, SeungYong
    Kim, Minsoo
    Seo, Jae-Hyun
    Noh, Bong-Nam
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 922 - 931
  • [48] Security Deficiencies in the Architecture and Overview of Android and iOS Mobile Operating Systems
    Jasek, Roman
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 153 - 161
  • [49] BlackBox: A Container Security Monitor for Protecting Containers on Untrusted Operating Systems
    Van't Hof, Alexander
    Nieh, Jason
    PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2022, 2022, : 683 - 700
  • [50] AN APPROACH FOR DETECTING SECURITY VULNERABILITIES IN WEB BROWSERS FOR MOBILE OPERATING SYSTEMS
    Mechev, Stoyan
    MATHEMATICS AND INFORMATICS, 2024, 67 (05): : 475 - 488