咨询与建议

限定检索结果

文献类型

  • 26 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 27 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 12 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 5 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 3 篇 机械工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 石油与天然气工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 公安技术
  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 系统科学
  • 1 篇 医学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 27 篇 linux security m...
  • 5 篇 lsm
  • 2 篇 access control
  • 2 篇 objective functi...
  • 2 篇 fuel flow
  • 2 篇 linux
  • 2 篇 linear synchrono...
  • 2 篇 kft
  • 2 篇 bypass ratio
  • 2 篇 motor drives
  • 2 篇 train stock
  • 2 篇 thermal loading
  • 2 篇 mandatory access...
  • 2 篇 chiller
  • 2 篇 bias
  • 2 篇 hep tumour stagi...
  • 2 篇 learning
  • 2 篇 aircraft
  • 2 篇 dataset
  • 2 篇 support vector n...

机构

  • 2 篇 cmu cylab pittsb...
  • 1 篇 kddi r&d labs sa...
  • 1 篇 tub tech univ be...
  • 1 篇 us air force res...
  • 1 篇 diies mediterran...
  • 1 篇 xylem washington...
  • 1 篇 dept. magnetic l...
  • 1 篇 florida inst tec...
  • 1 篇 rambla sant nebr...
  • 1 篇 school of comput...
  • 1 篇 dieei univ catan...
  • 1 篇 faculty of schoo...
  • 1 篇 department of cs...
  • 1 篇 indian inst sci ...
  • 1 篇 univ pittsburgh ...
  • 1 篇 faculty of schoo...
  • 1 篇 univ cincinnati ...
  • 1 篇 engler-bunte-rin...
  • 1 篇 department of el...
  • 1 篇 xidian univ sch ...

作者

  • 2 篇 miyake yutaka
  • 2 篇 qu ning
  • 2 篇 perrig adrian
  • 2 篇 takemori keisuke
  • 1 篇 zoellner hannes
  • 1 篇 matthew barth
  • 1 篇 javan tan
  • 1 篇 hyung-suk han
  • 1 篇 l. di donato
  • 1 篇 pontil massimili...
  • 1 篇 t. isernia
  • 1 篇 upadrashta radhi...
  • 1 篇 stiller christop...
  • 1 篇 vittorio murino
  • 1 篇 han hyung-suk
  • 1 篇 ji shaomin
  • 1 篇 yuan xin
  • 1 篇 ha chang-wan
  • 1 篇 murino vittorio
  • 1 篇 alqadah hatim f.

语言

  • 25 篇 英文
  • 2 篇 中文
检索条件"主题词=Linux Security Module"
27 条 记 录,以下是1-10 订阅
排序:
UClinux: a linux security module for Trusted-Computing-based Usage Controls Enforcement
UCLinux: a Linux Security Module for Trusted-Computing-based...
收藏 引用
ACM Workshop on Scalable Trusted Computing
作者: Kyle, David S. Brustoloni, Jose C. Univ Pittsburgh Dept Comp Sci Pittsburgh PA 15260 USA
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform modules (TPMs) that are built into an incr... 详细信息
来源: 评论
Analyzing the Overhead of File Protection by linux security modules  21
Analyzing the Overhead of File Protection by Linux Security ...
收藏 引用
16th ACM ASIA Conference on Computer and Communications security (ACM ASIACCS)
作者: Zhang, Wenhui Liu, Peng Jaeger, Trent Penn State Univ State Coll PA 16801 USA
Over the years, the complexity of the linux security module (LSM) is keeping increasing (e.g. 10,684 LOC in linux v2.6.0 vs. 64,018 LOC in v5.3), and the count of the authorization hooks is nearly doubled (e.g. 122 ho... 详细信息
来源: 评论
Efficiently Supporting Attribute-Based Access Control in linux
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2024年 第4期21卷 2012-2026页
作者: Varshith, H. O. Sai Sural, Shamik Vaidya, Jaideep Atluri, Vijayalakshmi Indian Inst Technol Dept Comp Sci & Engn Kharagpur 721302 W Bengal India Rutgers State Univ MSIS Dept Newark NJ 07103 USA
linux is a widely used multi-user operating system with applications ranging from personal desktop to commercial heavy duty web servers. It has built-in security features based on discretionary access control enforced... 详细信息
来源: 评论
Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices  24
Hardening the Internet of Things: Toward Designing Access Co...
收藏 引用
17th Cyber security Experimentation and Test Workshop (CSET)
作者: Bessler, Manuel Sangster, Paul Upadrashta, Radhika OConnor, T. J. Xylem Washington DC 20003 USA Florida Inst Technol Melbourne FL 32901 USA
A myriad of security and privacy threats have accompanied the rapid proliferation and widespread adoption of Internet-of-Things (IoT) devices. IoT vendors often justify this challenge by citing the difficulty of secur... 详细信息
来源: 评论
Commercial Hybrid Electric Aircraft Thermal Management Sensitivity Studies
Commercial Hybrid Electric Aircraft Thermal Management Sensi...
收藏 引用
AIAA Propulsion and Energy Forum
作者: Rheaume, Jonathan M. Lents, Charles E. Raytheon Technol Res Ctr Thermal Management 411 Silver Lane E Hartford CT 06108 USA
Weight sensitivity studies were carried out on a Thermal Management System (TMS) of a parallel Hybrid Electric Propulsion (HEP) system of a commercial single aisle aircraft. The HEP system features a battery that feed... 详细信息
来源: 评论
Magnetic levitation control including bogie roll motion  7
Magnetic levitation control including bogie roll motion
收藏 引用
Proceedings of the 2015 7th IEEE International Conference on Cybernetics and Intelligent Systems (CIS) And Robotics, Automation and Mechatronics (RAM)
作者: Ha, Chang-Wan Kim, Chang-Hyun Lim, Jaewon Chae, Jubyeong Han, Hyung-Suk Korea Inst Machinery & Mat Dept Magnet Levitat & Linear Drive Daejeon South Korea
The uneven reaction surface profile facing the lift magnets in attractive maglev vehicle based on linear synchronous motor (LSM) naturally brings about roll motion of the bogie. In particular, in the configuration of ... 详细信息
来源: 评论
LSM-based Secure System Monitoring Using Kernel Protection Schemes
LSM-based Secure System Monitoring Using Kernel Protection S...
收藏 引用
5th International Conference on Availability, Reliability and security
作者: Isohara, Takamasa Takemori, Keisuke Miyake, Yutaka Qu, Ning Perrig, Adrian KDDI R&D Labs Saitama Japan CMU CyLab Pittsburgh PA USA
Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the linux kernel 2.6, a set o... 详细信息
来源: 评论
A new Intrusion Detection Mechanism in SElinux  2
A new Intrusion Detection Mechanism in SELinux
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Zhang, Runnan Liu, Gang Yuan, Xin Ji, Shaomin Zhang, Guofang Xidian Univ Sch Comp Sci & Technol Xian 710071 Peoples R China
A new intrusion detection mechanism in SElinux based on dual-Markov chain and triggered by critical system calls is put forward in this paper. The mechanism integrates access control with intrusion detection by linux ... 详细信息
来源: 评论
Robot navigation using neuro-electronic hybrid systems  28
Robot navigation using neuro-electronic hybrid systems
收藏 引用
28th International Conference on VLSI Design (VLSID) / 14th International Conference on Embedded Systems
作者: George, Jude Baby Abraham, Grace Mathew Amrutur, Bharadwaj Sikdar, Sujit Kumar Indian Inst Sci Ctr Nanosicence & Engn Bangalore 560012 Karnataka India Indian Inst Sci Dept Elect Commun Engn Bangalore 560012 Karnataka India Indian Inst Sci Mol Biophys Unit Bangalore 560012 Karnataka India
Neuro-electronic hybrid systems have been gaining interest of researchers as a possible architecture for computing. This aims to exploit the strengths of biological neuronal systems with their immense parallel process... 详细信息
来源: 评论
Remote Attestation for HDD Files using Kernel Protection Mechanism
Remote Attestation for HDD Files using Kernel Protection Mec...
收藏 引用
2010 IEEE International Conference on Communications
作者: Takemori, Keisuke Perrig, Adrian Qu, Ning Miyake, Yutaka KDDI R&D Labs Fujimino Saitama Japan CMU CyLab Pittsburgh PA USA
A remote attestation that measures files on a hard disk drive (HDD) is important for intrusion detection on a data center server. When the server is infected by a rootkit or when a file measurement application is mani... 详细信息
来源: 评论