Kapselung von Standard-Betriebssystemen

Inhaltsverzeichnis 1 Einleitung 1

[1]  Trent Jaeger,et al.  The SawMill framework for virtual memory diversity , 2001 .

[2]  David A. Wheeler More Than a Gigabuck: Estimating GNU/Linux''s Size , 2002, WWW 2002.

[3]  Gernot Heiser,et al.  Towards Untrusted Device Drivers , 2003 .

[4]  Hermann Härtig,et al.  Low-latency hard real-time communication over switched Ethernet , 2004, Proceedings. 16th Euromicro Conference on Real-Time Systems, 2004. ECRTS 2004..

[5]  Victor Yodaiken The RTLinux Manifesto , 1999 .

[6]  Hermann Härtig,et al.  Cost and benefit of separate address spaces in real-time operating systems , 2002, 23rd IEEE Real-Time Systems Symposium, 2002. RTSS 2002..

[7]  Hendrik Tews,et al.  Applying source-code verification to a microkernel: the VFiasco project , 2002, EW 10.

[8]  Andrew Warfield,et al.  Safe Hardware Access with the Xen Virtual Machine Monitor , 2007 .

[9]  Laurent Réveillère,et al.  Devil: an IDL for hardware programming , 2000, OSDI.

[10]  Junfeng Yang,et al.  An empirical study of operating systems errors , 2001, SOSP.

[11]  Cynthia E. Irvine,et al.  Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.

[12]  Carl A. Waldspurger,et al.  Memory resource management in VMware ESX server , 2002, OSDI '02.

[13]  Tal Garfinkel,et al.  Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.

[14]  Beng-Hong Lim,et al.  Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.

[15]  Andreas Haeberlen,et al.  Performance of address-space multiplexing on the Pentium , 2002 .

[16]  Dennis Shasha,et al.  Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.

[17]  David J. Sager,et al.  The microarchitecture of the Pentium 4 processor , 2001 .

[18]  Brian N. Bershad,et al.  Fast mutual exclusion for uniprocessors , 1992, ASPLOS V.

[19]  Larry L. Peterson,et al.  Implementing Atomic Sequences on Uniprocessors Using Rollforward , 1996, Softw. Pract. Exp..

[20]  Brian N. Bershad,et al.  Improving the reliability of commodity operating systems , 2005, TOCS.

[21]  Jochen Liedtke,et al.  Improved Address-Space Switching on Pentium Processors by Transparently Multiplexing User Address Sp , 1995 .

[22]  James Cheney,et al.  Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.

[23]  Marianne Shaw,et al.  Scale and performance in the Denali isolation kernel , 2002, OSDI '02.

[24]  Jochen Liedtke,et al.  On micro-kernel construction , 1995, SOSP.

[25]  Amy Carroll,et al.  Microsoft Palladium: A Business Overview , 2002 .

[26]  Alexander Warg,et al.  Mikro-SINA — Hands-on Experiences with the Nizza Security Architecture , 2005 .

[27]  Hermann Härtig,et al.  Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors , 2004, EW 11.

[28]  Richard E. Smith,et al.  Mandatory protection for Internet server software , 1996, Proceedings 12th Annual Computer Security Applications Conference.

[29]  Silvia Hollfelder,et al.  Gmd – German National Research Center for Information Technology , 1996 .

[30]  Masao Yamamoto,et al.  Speeding Up Kernel Scheduler by Reducing Cache Misses , 2002, USENIX Annual Technical Conference, FREENIX Track.

[31]  Jay Lepreau,et al.  The Flux OSKit: a substrate for kernel and language research , 1997, SOSP.

[32]  J. Löser,et al.  An I / O Architecture for Microkernel-Based Operating Systems , 2003 .

[33]  Rogier Dittner,et al.  An Introduction to Virtualization , 2007 .

[34]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[35]  Sebastian Schönberg,et al.  Using PCI bus systems in real time environments , 2002 .

[36]  Morrie Gasser,et al.  Building a Secure Computer System , 1988 .

[37]  Hermann Härtig,et al.  Taming Linux , 1998 .

[38]  Scott Devine,et al.  Disco: running commodity operating systems on scalable multiprocessors , 1997, TOCS.

[39]  Brian Tierney,et al.  TCP Tuning Guide for Distributed Application on Wide Area Networks , 2001, login Usenix Mag..

[40]  Hermann Härtig,et al.  Pragmatic Nonblocking Synchronization for Real-Time Systems , 2001, USENIX Annual Technical Conference, General Track.

[41]  Anne-Kathrin Lauer Literaturverzeichnis. , 1935, Die Nichtangriffsverpflichtung im deutschen und europäischen Kartellrecht.

[42]  Jochen Liedtke,et al.  The performance of μ-kernel-based systems , 1997, SOSP.

[43]  Joshua LeVasseur,et al.  Towards Scalable Multiprocessor Virtual Machines , 2004, Virtual Machine Research and Technology Symposium.

[44]  Trent Jaeger,et al.  The SawMill framework for virtual memory diversity , 2001, Proceedings 6th Australasian Computer Systems Architecture Conference. ACSAC 2001.

[45]  Dawson R. Engler,et al.  Exokernel: an operating system architecture for application-level resource management , 1995, SOSP.

[46]  John M. Rushby,et al.  Design and verification of secure systems , 1981, SOSP.

[47]  J. Liedtke On -Kernel Construction , 1995 .

[48]  R. Sailer,et al.  sHype : Secure Hypervisor Approach to Trusted Virtualized Systems , 2005 .

[49]  Stefan Götz,et al.  Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines , 2004, OSDI.

[50]  T. Alves,et al.  TrustZone : Integrated Hardware and Software Security , 2004 .

[51]  Robert J. Creasy,et al.  The Origin of the VM/370 Time-Sharing System , 1981, IBM J. Res. Dev..