Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer...
Micro kernel-based systems have gone through a steady development and current implementations have reached a new level of functionality. While the first systems started with the fundamental idea, latest systems offer a wide range of features. Experience showed that the most important feature, a secure system architecture, cannot be retrofitted into the system at a later stage but must be the core...
Devices for the mobile market have to satisfy a set of challenging constraints. In addition to the classical power, reliability and cost constraints, modern devices often have to be open to third party applications and at the same time provide a closed and secure environment for system functionality. In current systems, this antagonism is solved by maintaining a physical separation of subsystems with...
File system integrity is very important to a system security, because it affects all users that share system files. Therefore, file system integrity tool (FIT) is widely used for host based file system monitoring. Recently, virtualization technology is applied to several computing areas such as server virtualization and cloud computing, and increasingly demands for a FIT. However, previous virtual...
A framework was designed for fusing security information from multiple sources to evaluate host security risk. We selected four types of information that may good indicators of host security status, they are host resource usage, host real-time traffic, OS kernel files status and other security device information. In the information fusion module, the D-S evidence theory was used to fuse all the dynamic...
When a host computer is attacked, files in the host computer are more or less unauthorizedly modified so as to achieve attacker's goal. Based on trusted computing technology, we present a trusted computer based approach for sensitive binary files protection. Different from traditional methods, our approach does not based on "condition-code", "intrusion-rule" and so on. It is checksum-based:...
This paper presents an automata-based approach for analyzing traces generated by the kernel of an operating system. We identified a list of typical patterns of problematic behavior, to look for in a trace, and selected an appropriate state machine language to describe them. These patterns were then fed into an off-line analyzer which efficiently and simultaneously checks for their occurrences even...
Virtualization, well established in enterprise computing, is finding its way into embedded systems. However, the use cases differ dramatically between the domains, and this results in significant differences in the requirements on the virtual-machine technology. This paper examines a number of typical virtualization use cases from the CE domain, and the resulting requirements imposed on the hypervisor...
Mobile ad hoc network (MANET) is an autonomous distributed network which is constructed only with gathered nodes on the spot. In MANET, wide area communication on wireless networks can be realized because a node relays other node's packets by adopting a multi-hop routing protocol. Security is an indispensable issue in MANET because an unknown node may join the network easily. However, the demand for...
Microkernels have been developed to minimize the size of software that needs to run in privileged CPU mode. It provides a minimal set of general hardware abstractions and able to implement an operating system with a high level of reliability and security. In L4 microkernel, the creation of address spaces, thread and inter process communication as fundamental abstraction is important in the development...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.