Partitioning the trusted computing base of applications on commodity systems

Secure containers implemented in both software and hardware are being used to isolate and reduce attack vectors on executing software. The isolation of software partitions protects the data and the execution from external software (e.g. the OS, other applications, other software partitions within th...

Full description

Bibliographic Details
Main Author: Atamli, Ahmad
Other Authors: Martin, Andrew P.
Published: University of Oxford 2017
Subjects:
004
Online Access:https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.757712