Back to Results
First PageMeta Content
Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software


Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT
Add to Reading List

Open Document

File Size: 208,92 KB

Share Result on Facebook

Company

MySpace / Intel / Facebook / D-Cache Exceptions Writeback Memory / /

Facility

port of HiStar / Unix library / port HiStar / Loki pipeline / /

IndustryTerm

secure systems / tagged memory processor / asynchronous device / software-filled permissions / web application / web server stores personal profile information / cooperative scheduling protocol / peripheral devices / web server / trusted computing base / external device / secure applications / malicious web applications / software component / building secure systems / /

OperatingSystem

Unix / Unix system / Unix-like / /

Organization

MIT / Stanford University / /

Person

Tag Handling / Michael Dalton / Christos Kozyrakis / Hari Kannan / /

Position

disk device driver / driver / Supervisor / system administrator / network device driver / device driver / scheduler / Unix Lib Unix Lib Unix Lib Unix Lib Unix Lib Unix Lib Kernel Kernel Kernel User mode Supervisor / Controller / User mode Kernel Kernel Kernel Supervisor / /

ProgrammingLanguage

C / /

Technology

FPGA / RAM / SPARC processor / flow control / peer-to-peer / Unix / API / cooperative scheduling protocol / Unix system / paging / tagged memory processor / operating system / operating systems / flash / web server / /

SocialTag