Operating system level support for coherence in distributed systems

1992 ◽  
Author(s):  
Mike Livesey ◽  
Colin Allison
2018 ◽  
Vol 2 (5) ◽  
pp. 295
Author(s):  
Hamid Reza Ganji ◽  
Kiarash Aghakhani

The security of the configuration of files in the Linux operating system depends on many factors that can be referenced to the system level and the applicable level. The most important thing about the security of Linux operating systems is its dynamism, for example, when you secure your Linux system, it will not stay safe forever, because applications and cyber criminals through new threats and/or new exploits that are packaged Systems or applications that cause the operating system to become unsafe, for this reason, we need a secure operating system. The main purpose of this article is to provide a new way to enhance the security of the Linux operating system. For this purpose, how can simple, continuous, and practical Linux environment be secured, solutions are presented, also based on performance analysis of the proposed method and evaluation parameters for existing systems against the proposed system, the superiority of this method is introduced.


2014 ◽  
Vol 687-691 ◽  
pp. 3809-3811
Author(s):  
Yan Lin Gao ◽  
Wen Peng Wang ◽  
Chuan Sheng Wu

In the interaction of the operating system, drivers and peripheral equipment, for the user of the system at a low level, understand the importance of the system architecture of data communication, hardware programming. In this paper, we through the research and development ofa USB device driver for the underlying data communication and resource management. The method of reverse engineering in this study, we focus on exploring the use of Linux operating system USB protocol and the development of device driver. We must from the evaluation of differentdevice drivers for a variety of experiments and the test results are verygood. We believe, can offer the theoretical basis for the user a clearunderstanding of the actual data communication from the hardware to the user space application and any unsupported peripheral hardware device for the reproduction of the work.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Seyyed Amir Asghari ◽  
Okyay Kaynak ◽  
Hassan Taheri

Electronic equipment operating in harsh environments such as space is subjected to a range of threats. The most important of these is radiation that gives rise to permanent and transient errors on microelectronic components. The occurrence rate of transient errors is significantly more than permanent errors. The transient errors, or soft errors, emerge in two formats: control flow errors (CFEs) and data errors. Valuable research results have already appeared in literature at hardware and software levels for their alleviation. However, there is the basic assumption behind these works that the operating system is reliable and the focus is on other system levels. In this paper, we investigate the effects of soft errors on the operating system components and compare their vulnerability with that of application level components. Results show that soft errors in operating system components affect both operating system and application level components. Therefore, by providing endurance to operating system level components against soft errors, both operating system and application level components gain tolerance.


2015 ◽  
Vol 52 ◽  
pp. 207-220 ◽  
Author(s):  
Sascha Wessel ◽  
Manuel Huber ◽  
Frederic Stumpf ◽  
Claudia Eckert

2004 ◽  
Vol 34 (8) ◽  
pp. 727-755
Author(s):  
ZoltánÁdám Mann ◽  
Károly Kondorosi

Sign in / Sign up

Export Citation Format

Share Document