Partitioning the trusted computing base of applications on commodity systems
Secure containers implemented in both software and hardware are being used to isolate and reduce attack vectors on executing software. The isolation of software partitions protects the data and the execution from external software (e.g. the OS, other applications, other software partitions within th...
Main Author: | |
---|---|
Other Authors: | |
Published: |
University of Oxford
2017
|
Subjects: | |
Online Access: | https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757712 |