Research on Operating System Kernel Security Based on Mandatory Behavior Control Mechanism (MBC)

Author(s):  
Zhang Jinbo ◽  
Shen Wuqiang ◽  
Shen Guiquan
1990 ◽  
Vol 36 (9) ◽  
pp. 1572-1575 ◽  
Author(s):  
K S Margrey ◽  
A Martinez ◽  
D P Vaughn ◽  
R A Felder

Abstract Many clinical laboratory instruments are not designed for robotic compatibility, hence the need for standardization of data communications and analyzer interface hardware. We developed an interface with supporting software that simplifies communication between a microcomputer and clinical instruments. Our interface establishes a standardized bidirectional communications protocol, which is useful in many clinical laboratory robotic projects. Instruments targeted for interfacing require no prior on-board communications capabilities. Additionally, modifications to the clinical instrument are minimized. Once installed, the interface translates input commands to codes or actions recognizable by the analyzer. Features not normally available to the user, such as electrode real-time response and full instrument status, are also reported by the interface, thereby establishing a remote monitor and control mechanism for the interfaced instrument. We have written an operating system to control the interface microcomputer, which in turn commands and monitors the clinical analyzer. A host computer controls the information flow to the interface and provides (a) requests to the interface for instrument operation and status and (b) commands to the interface to initiate the desired instrument operation. This arrangement maintains complete instrument functionality as designed by the manufacturer while allowing remote monitoring and operation of the instrument.


2013 ◽  
Vol 380-384 ◽  
pp. 2200-2203
Author(s):  
Hong Wang

Linux is a comparatively safe operating system. This paper makes a research about the security policy for Linux, analyzing the principle and design idea of its identification and authentication mechanism, access control mechanism, Capability mechanism and security audit system. In this paper, the disadvantages of Linux system are pointed out and an improvement program is indicated so that the security performance of this system can be more effectively strengthened.


Author(s):  
Padma Lochan Pradhan

This proposed literature survey provides basic data regarding the first step of risk identification and analysis to achieve a secured infrastructure. The demand and risk are two parts of the same coin. The demand is directly proportional to the risk, but preventive control is inversely proportional to risk. The necessity of preventive control in any organization has increased because of the changes in logic, structure, and the type of technology applied to services that generate risks. Finally, the business increases along with technology, which creates risks and spreads over its infrastructure. We have to focus on protecting, detecting, correcting, verifying and validating the Unix file system. This survey article proposes and resolves the Unix file system by applying a hardening, re-configuration and access control mechanism up to the highest level of preventive control.


2021 ◽  
Vol 23 (06) ◽  
pp. 514-520
Author(s):  
Deekshith Nayak ◽  
◽  
Dr. H. V. Ravish Aradhya ◽  

Containerization is a leading technological advancement in cloud-native developments. Virtualization isolates the running processes at the bare metal level but containerization isolates the processes at the operating system level. Virtualization encapsulates all the new virtual instances with a new operating system but containerization encapsulates the software only with its dependencies. Containerization avoids the problem of dependency missing between different operating systems and their distributions. The concept of containerization is old but the development of open-source tools like Docker, Kubernetes, and Openshift accelerated the adaption of this technology. Docker builds container images and Openshift or Kubernetes is an Orchestrating tool. For stateful applications, Kubernetes workload resources are not a better option to orchestrate the application, as each resource has its own identity. In such cases, the operator can be built to manage the entire life cycle of resources in the Kubernetes cluster. Operator combines human operational knowledge into software code in a systematic way. The paper discusses the default control mechanism in Kubernetes and then it explains the procedure to build the operator to orchestrate the stateful application.


Author(s):  
E. Wisse ◽  
A. Geerts ◽  
R.B. De Zanger

The slowscan and TV signal of the Philips SEM 505 and the signal of a TV camera attached to a Leitz fluorescent microscope, were digitized by the data acquisition processor of a Masscomp 5520S computer, which is based on a 16.7 MHz 68020 CPU with 10 Mb RAM memory, a graphics processor with two frame buffers for images with 8 bit / 256 grey values, a high definition (HD) monitor (910 × 1150), two hard disks (70 and 663 Mb) and a 60 Mb tape drive. The system is equipped with Imaging Technology video digitizing boards: analog I/O, an ALU, and two memory mapped frame buffers for TV images of the IP 512 series. The Masscomp computer has an ethernet connection to other computers, such as a Vax PDP 11/785, and a Sun 368i with a 327 Mb hard disk and a SCSI interface to an Exabyte 2.3 Gb helical scan tape drive. The operating system for these computers is based on different versions of Unix, such as RTU 4.1 (including NFS) on the acquisition computer, bsd 4.3 for the Vax, and Sun OS 4.0.1 for the Sun (with NFS).


Author(s):  
Edna S. Kaneshiro

It is currently believed that ciliary beating results from microtubule sliding which is restricted in regions to cause bending. Cilia beat can be modified to bring about changes in beat frequency, cessation of beat and reversal in beat direction. In ciliated protozoans these modifications which determine swimming behavior have been shown to be related to intracellular (intraciliary) Ca2+ concentrations. The Ca2+ levels are in turn governed by the surface ciliary membrane which exhibits increased Ca2+ conductance (permeability) in response to depolarization. Mutants with altered behaviors have been isolated. Pawn mutants fail to exhibit reversal of the effective stroke of ciliary beat and therefore cannot swim backward. They lack the increased inward Ca2+ current in response to depolarizing stimuli. Both normal and pawn Paramecium made leaky to Ca2+ by Triton extrac¬tion of the surface membrane exhibit backward swimming only in reactivating solutions containing greater than IO-6 M Ca2+ Thus in pawns the ciliary reversal mechanism itself is left operational and only the control mechanism at the membrane is affected. The topographic location of voltage-dependent Ca2+ channels has been identified as a component of the ciliary mem¬brane since the inward Ca2+ conductance response is eliminated by deciliation and the return of the response occurs during cilia regeneration. Since the ciliary membrane has been impli¬cated in the control of Ca2+ levels in the cilium and therefore is the site of at least one kind of control of microtubule sliding, we have focused our attention on understanding the structure and function of the membrane.


1974 ◽  
Vol 32 (01) ◽  
pp. 057-064 ◽  
Author(s):  
Y Nemerson ◽  
S.A Silverberg ◽  
J Jesty

SummaryTwo reactions of the extrinsic pathway of coagulation, the activations of Factor X and prothrombin, have been studied in purified systems and shown to be self-damping. Factor X was activated by the tissue factor - Factor VII complex, and prothrombin by two systems: the coagulant protein of Taipan venom, and the physiological complex of activated Factor X, Factor V, lipid, and calcium ions. In each case the yield of enzyme, activated Factor X or thrombin, is a function of the concentration of activator. These and other observations are considered as a basis for a control mechanism in coagulation.


Sign in / Sign up

Export Citation Format

Share Document