Analyzing the security of Windows 7 and Linux for cloud computing

K Salah, JMA Calero, JB Bernabé, JMM Perez… - Computers & …, 2013 - Elsevier
We review and analyze the major security features and concerns in deploying modern
commodity operating systems such as Windows 7 and Linux 2.6. 38 in a cloud computing …

Improving mandatory access control for HPC clusters

M Blanc, JF Lalande - Future Generation Computer Systems, 2013 - Elsevier
hpc clusters are costly resources, hence nowadays these structures tend to be co-financed
by several partners. A cluster administrator has to be designated, whose duties include …

Ensuring application integrity: A survey on techniques and tools

L Catuogno, C Galdi - 2015 9th International Conference on …, 2015 - ieeexplore.ieee.org
This paper aims at offering a compact vision of the main solutions that have been proposed
to address the problem of ensuring the integrity and reliability of applications and executable …

Evaluation of linux security frameworks

E Karlsson - 2010 - diva-portal.org
The number of threats to computers attached to networks continually increases. The focus of
preventing security exploits has been on the network, while local exploits has been mostly …

Development of a secure Linux distribution

ΠΜ Τσεσμετζής - 2014 - dione.lib.unipi.gr
Περίληψη The various forms of UNIX inherently suffer from security issues. However, forms
of the Unix OS family are widely used, often in critical applications. The aim of this work is to …