Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorHu, P.
dc.date.accessioned2010-11-15T14:28:30Z
dc.date.available2010-11-15T14:28:30Z
dc.date.issued1995
dc.identifier.citationChristianson , B & Hu , P 1995 , Is your computing environment secure? Security problems with interrupt handling mechanisms . UH Computer Science Technical Report , vol. 222 , University of Hertfordshire .
dc.identifier.otherPURE: 99850
dc.identifier.otherPURE UUID: 2bba09c8-609b-405a-9420-67fe70600926
dc.identifier.otherdspace: 2299/4988
dc.identifier.urihttp://hdl.handle.net/2299/4988
dc.description.abstractIn an open distributed system, resources must be shared among various users. Security is one of the major issues in designing such a system. When a computer system is connected to a network, it is very important to ensure that the computer has the ability to manage its local resources securely. In this position paper, we will demonstrate that current computer architectures do give malicious users ways to penetrate computer systems and hence access the system or other user's secrets which are supposed to be well protected. We also propose some possible solutions to counterattack such security threats either at hardware or software level. The impacts of such mechanisms to system hardware and software are also discussed.en
dc.language.isoeng
dc.publisherUniversity of Hertfordshire
dc.relation.ispartofseriesUH Computer Science Technical Report
dc.rightsOpen
dc.titleIs your computing environment secure? Security problems with interrupt handling mechanismsen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.relation.schoolSchool of Computer Science
dcterms.dateAccepted1995
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue
herts.rights.accesstypeOpen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record