618
edits
[unchecked revision] | [unchecked revision] |
Glauxosdever (talk | contribs) (Fix formatting) |
|||
(4 intermediate revisions by 3 users not shown) | |||
Line 14:
* 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [[http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9257 CiteSeer link page]]
* 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 [[http://academiccommons.columbia.edu/catalog/ac%3A189973 Academic Commons link page]]
* 'Speculative Execution as an Operating System Service' by Locasto and Keromytis, 2006 [[http://academiccommons.columbia.edu/catalog/ac%3A110558 Academic Commons link page]]
Line 39 ⟶ 38:
* 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [[http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9257 CiteSeer link page]]
* 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 [[http://academiccommons.columbia.edu/catalog/ac%3A189973 Academic Commons link page]]
== Distributed Systems ==
Line 51 ⟶ 49:
== Specific Implementation Techniques ==
* 'PCLSRing: Keeping Process State Modular', Bawden, 1989 (unpublished draft) [http://www.hack.org/mc/texts/pclsr.txt hack.org repository]
[[Category:Resources]]
|