Kapselung von Standard-Betriebssystemen
暂无分享,去创建一个
[1] Trent Jaeger,et al. The SawMill framework for virtual memory diversity , 2001 .
[2] David A. Wheeler. More Than a Gigabuck: Estimating GNU/Linux''s Size , 2002, WWW 2002.
[3] Gernot Heiser,et al. Towards Untrusted Device Drivers , 2003 .
[4] Hermann Härtig,et al. Low-latency hard real-time communication over switched Ethernet , 2004, Proceedings. 16th Euromicro Conference on Real-Time Systems, 2004. ECRTS 2004..
[5] Victor Yodaiken. The RTLinux Manifesto , 1999 .
[6] Hermann Härtig,et al. Cost and benefit of separate address spaces in real-time operating systems , 2002, 23rd IEEE Real-Time Systems Symposium, 2002. RTSS 2002..
[7] Hendrik Tews,et al. Applying source-code verification to a microkernel: the VFiasco project , 2002, EW 10.
[8] Andrew Warfield,et al. Safe Hardware Access with the Xen Virtual Machine Monitor , 2007 .
[9] Laurent Réveillère,et al. Devil: an IDL for hardware programming , 2000, OSDI.
[10] Junfeng Yang,et al. An empirical study of operating systems errors , 2001, SOSP.
[11] Cynthia E. Irvine,et al. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.
[12] Carl A. Waldspurger,et al. Memory resource management in VMware ESX server , 2002, OSDI '02.
[13] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[14] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.
[15] Andreas Haeberlen,et al. Performance of address-space multiplexing on the Pentium , 2002 .
[16] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[17] David J. Sager,et al. The microarchitecture of the Pentium 4 processor , 2001 .
[18] Brian N. Bershad,et al. Fast mutual exclusion for uniprocessors , 1992, ASPLOS V.
[19] Larry L. Peterson,et al. Implementing Atomic Sequences on Uniprocessors Using Rollforward , 1996, Softw. Pract. Exp..
[20] Brian N. Bershad,et al. Improving the reliability of commodity operating systems , 2005, TOCS.
[21] Jochen Liedtke,et al. Improved Address-Space Switching on Pentium Processors by Transparently Multiplexing User Address Sp , 1995 .
[22] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[23] Marianne Shaw,et al. Scale and performance in the Denali isolation kernel , 2002, OSDI '02.
[24] Jochen Liedtke,et al. On micro-kernel construction , 1995, SOSP.
[25] Amy Carroll,et al. Microsoft Palladium: A Business Overview , 2002 .
[26] Alexander Warg,et al. Mikro-SINA — Hands-on Experiences with the Nizza Security Architecture , 2005 .
[27] Hermann Härtig,et al. Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors , 2004, EW 11.
[28] Richard E. Smith,et al. Mandatory protection for Internet server software , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[29] Silvia Hollfelder,et al. Gmd – German National Research Center for Information Technology , 1996 .
[30] Masao Yamamoto,et al. Speeding Up Kernel Scheduler by Reducing Cache Misses , 2002, USENIX Annual Technical Conference, FREENIX Track.
[31] Jay Lepreau,et al. The Flux OSKit: a substrate for kernel and language research , 1997, SOSP.
[32] J. Löser,et al. An I / O Architecture for Microkernel-Based Operating Systems , 2003 .
[33] Rogier Dittner,et al. An Introduction to Virtualization , 2007 .
[34] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[35] Sebastian Schönberg,et al. Using PCI bus systems in real time environments , 2002 .
[36] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[37] Hermann Härtig,et al. Taming Linux , 1998 .
[38] Scott Devine,et al. Disco: running commodity operating systems on scalable multiprocessors , 1997, TOCS.
[39] Brian Tierney,et al. TCP Tuning Guide for Distributed Application on Wide Area Networks , 2001, login Usenix Mag..
[40] Hermann Härtig,et al. Pragmatic Nonblocking Synchronization for Real-Time Systems , 2001, USENIX Annual Technical Conference, General Track.
[41] Anne-Kathrin Lauer. Literaturverzeichnis. , 1935, Die Nichtangriffsverpflichtung im deutschen und europäischen Kartellrecht.
[42] Jochen Liedtke,et al. The performance of μ-kernel-based systems , 1997, SOSP.
[43] Joshua LeVasseur,et al. Towards Scalable Multiprocessor Virtual Machines , 2004, Virtual Machine Research and Technology Symposium.
[44] Trent Jaeger,et al. The SawMill framework for virtual memory diversity , 2001, Proceedings 6th Australasian Computer Systems Architecture Conference. ACSAC 2001.
[45] Dawson R. Engler,et al. Exokernel: an operating system architecture for application-level resource management , 1995, SOSP.
[46] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.
[47] J. Liedtke. On -Kernel Construction , 1995 .
[48] R. Sailer,et al. sHype : Secure Hypervisor Approach to Trusted Virtualized Systems , 2005 .
[49] Stefan Götz,et al. Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines , 2004, OSDI.
[50] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[51] Robert J. Creasy,et al. The Origin of the VM/370 Time-Sharing System , 1981, IBM J. Res. Dev..