scispace - formally typeset
Proceedings ArticleDOI

Bitfrost: the one laptop per child security model

TLDR
An integrated security model for a low-cost laptop that will be widely deployed throughout the developing world is presented, designed to restrict the laptop's software without restricting theaptop's user.
Abstract
We present an integrated security model for a low-cost laptop that will be widely deployed throughout the developing world. Implemented on top of Linux operating system, the model is designed to restrict the laptop's software without restricting the laptop's user.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Understanding Android Security

TL;DR: Android's security model is described and attempts to unmask the complexity of secure application development, identifying lessons and opportunities for future enhancements.
Journal ArticleDOI

Computer Usage by Children with Down Syndrome: Challenges and Future Research

TL;DR: The relationship between the age and the specific type of difficulties, as well as related design challenges, are reported and a number of potential research directions and hypotheses are identified for future studies.
Journal ArticleDOI

Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM

TL;DR: Results indicate that a functionality-based approach has significant potential in terms of enabling end users with limited expertise to defend themselves against insecure and malicious software.
Book ChapterDOI

Security Issues in Ubiquitous Computing

TL;DR: The manifesto of ubiquitous computing is traditionally considered to be the justly famous 1991 visionary article written for Scientific American by Mark Weiser of Xerox PARC, but the true birth date of this revolution precedes that publication by at least a few years.
Journal ArticleDOI

The state of the art of application restrictions and sandboxes

TL;DR: The motivation for application restrictions and sandboxes is described, presenting an in-depth review of the literature covering existing systems, and recommendations for usability and abstraction are considered to be considered to a further extent when designing application-oriented access controls.
References
More filters
Proceedings ArticleDOI

Security Policies and Security Models

TL;DR: The reader is familiar with the ubiquity of information in the modern world and is sympathetic with the need for restricting rights to read, add, modify, or delete information in specific contexts.
Proceedings Article

StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks

TL;DR: StackGuard is described: a simple compiler technique that virtually eliminates buffer overflow vulnerabilities with only modest performance penalties, and a set of variations on the technique that trade-off between penetration resistance and performance.

The application/json Media Type for JavaScript Object Notation (JSON)

TL;DR: This memo provides information for the Internet community on JSON, a lightweight, text-based, language-independent data interchange format derived from the ECMAScript Programming Language Standard.

Secure Computer Systems: Mathematical Foundations

TL;DR: The first results of an investigation into solutions to problems of security in computer systems are reported, establishing the basis for rigorous investigation by providing a general descriptive model of a computer system.
Trending Questions (1)
Which laptop brand is best for software development?

We present an integrated security model for a low-cost laptop that will be widely deployed throughout the developing world.