Academic literature on the topic 'Operating system security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Operating system security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Operating system security"
Jaeger, Trent. "Operating System Security." Synthesis Lectures on Information Security, Privacy, and Trust 1, no. 1 (2008): 1–218. http://dx.doi.org/10.2200/s00126ed1v01y200808spt001.
Full textPost, Gerald V. "Improving operating system security." Computers & Security 6, no. 5 (1987): 417–25. http://dx.doi.org/10.1016/0167-4048(87)90014-9.
Full textZhao, Ming Xin. "Research on Operating System Security Technology." Applied Mechanics and Materials 703 (December 2014): 294–97. http://dx.doi.org/10.4028/www.scientific.net/amm.703.294.
Full textMalikovich, Karimov Madjit. "Random Number Generation in Operating Systems." American Journal of Applied Science and Technology 5, no. 5 (2025): 74–81. https://doi.org/10.37547/ajast/volume05issue05-17.
Full textFinzel, Tobie. "Trends in Operating System Security." Information Systems Security 1, no. 1 (1992): 50–57. http://dx.doi.org/10.1080/19393559208551317.
Full textRöpke, Christian, and Thorsten Holz. "On network operating system security." International Journal of Network Management 26, no. 1 (2015): 6–24. http://dx.doi.org/10.1002/nem.1918.
Full textPiyushi, Gulati, Kumari Rana Kamini, Raghuvanshi Surabhi, and Anupama Pankaj Dr. "Android Operating System and its Security Issues." Journal of Android and IOS Applications and Testing 4, no. 1 (2019): 1–9. https://doi.org/10.5281/zenodo.2605874.
Full textDiLuoffo, Vincenzo, William R. Michalson, and Berk Sunar. "Robot Operating System 2." International Journal of Advanced Robotic Systems 15, no. 3 (2018): 172988141877001. http://dx.doi.org/10.1177/1729881418770011.
Full textJo, Hyeonseong, Jaehyun Nam, and Seungwon Shin. "NOSArmor: Building a Secure Network Operating System." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9178425.
Full textSai Asritha, G. "Security for files in Operating System." International Journal of Security Technology for Smart Device 3, no. 2 (2016): 1–6. http://dx.doi.org/10.21742/ijstsd.2016.3.2.01.
Full textDissertations / Theses on the topic "Operating system security"
Watson, Robert Nicholas Maxwell. "New approaches to operating system security extensibility." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609485.
Full textGoktepe, Meftun. "Windows XP Operating System security analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FGoktepe.pdf.
Full textStevenson, Martijn. "Asbestos : operating system security for mobile devices." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/37101.
Full textNemouchi, Yakoub. "Model-based Testing of Operating System-Level Security Mechanisms." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS061/document.
Full textÖberg, Jonas. "Comparative study of operating system security using SELinux and Systrace." Thesis, University of Kalmar, School of Communication and Design, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-2015.
Full textVanDeBogart, Steven Vincent. "Modernizing operating system interfaces to improve application security and performance." Diss., Restricted to subscribing institutions, 2009. http://proquest.umi.com/pqdweb?did=1973051411&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Full textWeisblat, Jakob H. "Improving security at the system-call boundary in a type-safe operating system." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121686.
Full textKauer, Bernhard. "Improving System Security Through TCB Reduction." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-162177.
Full textWang, Xiaolong. "A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7589.
Full textPayne, Christian. "A cryptographically-based operating system security model that protects against privileged attackers." Thesis, Payne, Christian (2009) A cryptographically-based operating system security model that protects against privileged attackers. PhD thesis, Murdoch University, 2009. https://researchrepository.murdoch.edu.au/id/eprint/3931/.
Full textBooks on the topic "Operating system security"
Jaeger, Trent. Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0.
Full textZahid, Muhammad. Operating system and web security. University of East London, 2003.
Find full textScott, Mann. Linux system security: An administrator's guide to open source security tools. 2nd ed. Prentice Hall PTR, 2003.
Find full textToxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Prentice Hall, 2001.
Find full textHsiao, Aron. Sams Teach Yourself Linux Security Basics in 24 Hours. Pearson Education, 2003.
Find full text1956-, Enck John, ed. Windows NT magazine administrator's survival guide: System management and security. Duke Press, 1998.
Find full textRutstein, Charles B. Windows NT security: A practical guide to securing Windows NT servers and workstations. McGraw-Hill, 1997.
Find full textInstitute, IT Governance, ed. OS/390-z/OS security, audit and control features. IT Governance Institute, 2004.
Find full textBook chapters on the topic "Operating system security"
Stallings, William. "Operating System Security." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch24.
Full textRomá, Llorenç, and Bernard Tellenbach. "Secure Operating System." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_21.
Full textJaeger, Trent. "Security Kernels." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_6.
Full textJaeger, Trent. "System Assurance." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_12.
Full textJaeger, Trent. "Verifiable Security Goals." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_5.
Full textCherry, Denny. "Computer Operating System Security." In Enterprise-Grade IT Security for Small and Medium Businesses. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8628-9_6.
Full textJaeger, Trent. "Securing Commercial Operating Systems." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_7.
Full textJaeger, Trent. "Secure Capability Systems." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_10.
Full textJaeger, Trent. "Case Study: Building a Secure Operating System for Linux." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_9.
Full textJaeger, Trent. "Access Control Fundamentals." In Operating System Security. Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-02333-0_2.
Full textConference papers on the topic "Operating system security"
Zhu, Wenzheng, and Changhoon Lee. "Design for Security Operating System." In 2009 Third Asia International Conference on Modelling & Simulation. IEEE, 2009. http://dx.doi.org/10.1109/ams.2009.109.
Full textBrookes, Scott, and Stephen Taylor. "Rethinking operating system design." In NSPW '16: New Security Paradigms Workshop 2016. ACM, 2016. http://dx.doi.org/10.1145/3011883.3011886.
Full textZovkic, Mario, and Tedo Vrbanec. "Computer classroom operating system security (Windows)." In 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2014. http://dx.doi.org/10.1109/mipro.2014.6859696.
Full textQing, Sihan. "Some issues regarding operating system security." In 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS). IEEE, 2014. http://dx.doi.org/10.1109/icis.2014.6912096.
Full textZhang, Yanhao, Xin He, Congyang Wang, and Junyang Yu. "SELinux-based operating system security research." In 2023 2nd International Conference on Applied Statistics, Computational Mathematics and Software Engineering (ASCMSE 2023), edited by Paulo Batista and Yudong Zhang. SPIE, 2023. http://dx.doi.org/10.1117/12.2691828.
Full textCajic, Miroslav, Bogdan Brkic, and Mladen Veinovic. "System of assessment security for Android operating system." In 2012 20th Telecommunications Forum Telfor (TELFOR). IEEE, 2012. http://dx.doi.org/10.1109/telfor.2012.6419491.
Full textHussain, Khaled, Sampada Sapre, and Poonam Hajgude. "Identifying criminal activities at the operating system level." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2005. http://dx.doi.org/10.1117/12.603044.
Full textSong, Jihong, Guiying Hu, and QuanSheng Xu. "Operating System Security and Host Vulnerability Evaluation." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5302077.
Full textJadhav, Namitha D., and Vanishree K. "Survey on Security Parameters of Operating System." In 2020 IEEE International Conference for Innovation in Technology (INOCON). IEEE, 2020. http://dx.doi.org/10.1109/inocon50539.2020.9298300.
Full textPouraghily, Arman, Tilman Wolf, and Russell Tessier. "Hardware support for embedded operating system security." In 2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP). IEEE, 2017. http://dx.doi.org/10.1109/asap.2017.7995260.
Full textReports on the topic "Operating system security"
Hollingworth, Dennis, Timothy Redmond, and Robert Rice. Extensible Operating System Security. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408087.
Full textMotamed, Ramin, David McCallen, and Swasti Saxena. An International Workshop on Large-Scale Shake Table Testing for the Assessment of Soil-Foundation-Structure System Response for Seismic Safety of DOE Nuclear Facilities, A Virtual Workshop – 17-18 May 2021. Pacific Earthquake Engineering Research Center, University of California, Berkeley, CA, 2024. http://dx.doi.org/10.55461/jjvo9762.
Full textPerdigão, Rui A. P. Neuro-Quantum Cyber-Physical Intelligence (NQCPI). Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/241024.
Full textRagozin, Konstantin. High-tech ecosystem in construction. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3187.
Full textNagle, Frank, James Dana, Jennifer Hoffman, Steven Randazzo, and Yanuo Zhou. Census II of Free and Open Source Software — Application Libraries. The Linux Foundation, 2022. https://doi.org/10.70828/kheh5209.
Full textGraham, Gordon. Why The World Needs an Open Source Digital Wallet Right Now. The Linux Foundation, 2023. https://doi.org/10.70828/zehc9956.
Full textStoneburner, Gary. COTS security protection profile-operating systems (CSPP-OS) :. National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.6985.
Full textHumpage, Sarah D. Benefits and Costs of Electronic Medical Records: The Experience of Mexico's Social Security Institute. Inter-American Development Bank, 2010. http://dx.doi.org/10.18235/0008829.
Full textPerdigão, Rui A. P. Triadic Flight Technologies. Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/240307.
Full textTinta, Jule Kaïni, Mouhamed Zerbo, Fabrizio Santoro, Awa Diouf, and Kèrabouro Pale. Electronic Services and Tax Compliance: Evidence from Medium and Small Businesses in Burkina Faso. Institute of Development Studies, 2024. http://dx.doi.org/10.19088/ictd.2024.099.
Full text