Text
Operating system security
Table of Contents:
1. Introduction
2. Access Control Fundamentals
3. Multics
4. Security in Ordinary Operating Systems
5. Verifiable Security Goals
6. Security Kernels
7. Securing Commercial Operating Systems
8. Case Study: Solaris Trusted Extensions
9. Case Study: Building a Secure Operating System for Linux
10. Secure Capability Systems
11. Secure Virtual Machine Systems
12. System Assurance
No other version available