Research on Operating System Security Technology

Article Preview

Abstract:

This paper study three mainstream operating system,their kernel module on-demand loading mechanism, their safety and reliability measures, points out the weaknesses these operating systems have in the kernel module security control. Along with the study of two new operating system -- dynamic extensible operating system and virtual address space based on file operation system, make a prospects on the operating system architecture development

You might also be interested in these eBooks

Info:

Periodical:

Pages:

294-297

Citation:

Online since:

December 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Loscocco P. Smalley S. Integrating Flexible Support for Security Policies into the Linux Operating System: [Technical report]. NSA and NAI labs,Jan. (2001).

Google Scholar

[2] Jorrit N Herder, Herbert Bos, Andrew S Tanenbaum. A light-weight method for building reliable operating systems despiteunreliable device drivers[R]. Technical Report IR-CS-018, (2006).

Google Scholar

[3] D. Wenlzlall and A. Agarwal. Factored operating systems (fos): the case for a scalable operating system for multicores. SICOPS Oper Syst. Rev., 43(2): 76 -85, (2009).

DOI: 10.1145/1531793.1531805

Google Scholar

[4] s. Bovd-Wickizer, H. Chen, et al. Corey: Anoperaling system for many cores. Proc of 8thUSENIXSymposium on Operating Systems Design and Implementation, pp.43-57, (2008).

Google Scholar

[5] SHELEPOV D, FEDOROVA A. Scheduling on heterogeneous multicore processors using architectural signatures[C] /Proc of Workshop on lnteraction between Operating Systems and Computer Architecture_ (2008).

Google Scholar