Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2012
Improving interrupt response time in a verifiable protected microkernel
EuroSys '12: Proceedings of the 7th ACM european conference on Computer SystemsPages 323–336https://doi.org/10.1145/2168836.2168869Many real-time operating systems (RTOSes) offer very small interrupt latencies, in the order of tens or hundreds of cycles. They achieve this by making the RTOS kernel fully preemptible, permitting interrupts at almost any point in execution except for ...
- research-articleJuly 2011
Protected hard real-time: the next frontier
APSys '11: Proceedings of the Second Asia-Pacific Workshop on SystemsArticle No.: 1, Pages 1–5https://doi.org/10.1145/2103799.2103801Hard real-time systems are typically written to execute either on bare metal or on a small real-time executive that offers no memory protection. This model scales poorly as systems become more complex and integrated, as is the trend in industry today. ...
- invited-talkOctober 2010
The road to trustworthy systems
STC '10: Proceedings of the fifth ACM workshop on Scalable trusted computingPages 3–10https://doi.org/10.1145/1867635.1867638Computer systems are routinely deployed in life- and mission-critical situations, yet their security, safety or dependability can in most cases not be assured to the degree warranted by the application. In other words, trusted computer systems are ...
- research-articleJanuary 2008
Open trusted health informatics structure (OTHIS)
The potential for development and deployment of trusted health information systems (HIS) based upon intrinsically more secure computer system architectures than those in general use, as commodity level systems, in today's marketplace is investigated in ...
- ArticleJanuary 2005
Agent-based distributed software verification
ACSC '05: Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38Pages 159–164Despite decades of research, the takeup of formal methods for developing provably correct software in industry remains slow. One reason for this is the high cost of proof construction, an activity that, due to the complexity of the required proofs, is ...
- ArticleJanuary 2004
Using self-defending objects to develop security aware applications in Java™
ACSC '04: Proceedings of the 27th Australasian conference on Computer science - Volume 26Pages 341–349The self defending object (SDO) approach to the development of security aware applications represents a change in the object oriented paradigm, whereby the software objects that encapsulate sensitive data or provide security sensitive functionality are ...
- ArticleAugust 1995
Administration in a multiple policy/domain environment: the administration and melding of disparate policies
New standards for trusted systems propose multiple security policies and multiple policy domains. My experience building a Mutipolicy Machine prototype illustrated that multiple policy domains and complex policies push current policy administration ...