Operating System

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 288 Experts worldwide ranked by ideXlab platform

Peter M Chen - One of the best experts on this subject based on the ideXlab platform.

  • Operating System support for virtual machines
    USENIX Annual Technical Conference, 2003
    Co-Authors: Samuel T. King, George W Dunlap, Peter M Chen
    Abstract:

    A virtual-machine monitor (VMM) is a useful technique for adding functionality below existing Operating System and application software. One class of VMMs (called Type II VMMs) builds on the abstractions provided by a host Operating System. Type II VMMs are elegant and convenient, but their performance is currently an order of magnitude slower than that achieved when running outside a virtual machine (a standalone System). In this paper, we examine the reasons for this large overhead for Type II VMMs. We find that a few simple extensions to a host Operating System can make it a much faster platform for running a VMM. Taking advantage of these extensions reduces virtualization overhead for a Type II VMM to 14-35% overhead, even for workloads that exercise the virtual machine intensively.

Russo, Vincent Frank - One of the best experts on this subject based on the ideXlab platform.

  • An object-oriented Operating System
    1
    Co-Authors: Russo, Vincent Frank
    Abstract:

    This thesis describes an experiment to use object-oriented programming and design techniques to design and implement an Operating System. This experiment uses object-oriented techniques to address problems of Operating System portability, maintainability, extensibility and efficiency. The thesis also characterizes an object-oriented Operating System.The results of this experiment are presented in two parts. First, after presenting background information and relevant definitions, I characterize an object-oriented Operating System. I then proceed to describe the design and implementation of an experimental object-oriented Operating System. This presentation maps conventional Operating System wisdom into the object-oriented framework supported by the experimental System. In this way, I show that object-oriented techniques can support realistic Operating System algorithms and mechanisms, as well as provide software engineering advantages. The presentation of the System stresses ways in which object-oriented techniques support the System's design and implementation.The experimental System is evaluated in terms of performance, maintainability, portability and extensibility by using examples of how characteristic Operating System problems are addressed. I will show that structuring an Operating System in an object-oriented fashion and using the capabilities provided by an object-oriented programming language allows the construction of portable, extensible and maintainable Operating Systems without sacrificing performance. Not only is performance not sacrificed, I will even show how such techniques can often help lead to increased performance over conventionally structured Systems.U of I OnlyETDs are only available to UIUC Users without author permissio

Vincent Frank Russo - One of the best experts on this subject based on the ideXlab platform.

  • An object-oriented Operating System
    1991
    Co-Authors: Vincent Frank Russo
    Abstract:

    This thesis describes an experiment to use object-oriented programming and design techniques to design and implement an Operating System. This experiment uses object-oriented techniques to address problems of Operating System portability, maintainability, extensibility and efficiency. The thesis also characterizes an object-oriented Operating System. The results of this experiment are presented in two parts. First, after presenting background information and relevant definitions, I characterize an object-oriented Operating System. I then proceed to describe the design and implementation of an experimental object-oriented Operating System. This presentation maps conventional Operating System wisdom into the object-oriented framework supported by the experimental System. In this way, I show that object-oriented techniques can support realistic Operating System algorithms and mechanisms, as well as provide software engineering advantages. The presentation of the System stresses ways in which object-oriented techniques support the System's design and implementation. The experimental System is evaluated in terms of performance, maintainability, portability and extensibility by using examples of how characteristic Operating System problems are addressed. I will show that structuring an Operating System in an object-oriented fashion and using the capabilities provided by an object-oriented programming language allows the construction of portable, extensible and maintainable Operating Systems without sacrificing performance. Not only is performance not sacrificed, I will even show how such techniques can often help lead to increased performance over conventionally structured Systems.

James L. Worrell - One of the best experts on this subject based on the ideXlab platform.

  • Evaluation of Network Operating System Security Controls
    Issues in Accounting Education, 2003
    Co-Authors: Cheryl L. Dunn, Gregory J. Gerard, James L. Worrell
    Abstract:

    Systems and financial statement auditors are often responsible for evaluating compliance with System security controls as part of their annual audit procedures. This assignment provides a practical learning experience that relates your course material to actual tasks practitioners perform. You are provided with simulated data from a realistic company example and are asked practitioner‐relevant questions covering a variety of issues related to network Operating System access. Monitoring and limiting network Operating System access and mitigating the related risk is crucial since any application (including accounting applications) can be accessed, and potentially compromised, through the network Operating System.

Jason Andress - One of the best experts on this subject based on the ideXlab platform.

  • Operating System Security
    The Basics of Information Security, 2014
    Co-Authors: Jason Andress
    Abstract:

    In this chapter, we explore hardening as one of the primary tools for securing the Operating System and the steps that we take to do so. We also review the additional security-related software we might use to secure our Systems, including anti-malware tools, software firewalls, and host-based intrusion detection Systems, in order to protect us from a variety of attacks. Lastly, we touch on some of the security tools we can use from an Operating System perspective, including port scanners such as Nmap, vulnerability analysis tools such as Nessus, and exploit frameworks such as Metasploit.

  • Chapter 9 – Operating System Security
    The Basics of Information Security, 2011
    Co-Authors: Jason Andress
    Abstract:

    Publisher Summary When one seeks to protect the data, processes, and applications against concerted attacks, one of the largest areas in which weaknesses are faced is on the Operating System that hosts all of these. There are a number of ways by which the various threats can be mitigated and vulnerabilities one might face from an Operating System perspective can be identified. One of the easiest categories one can point out is Operating System hardening. This technique can be used when configuring hosts that might face hostile action in order to decrease the number of openings through which an attacker might ultimately reach the host. This chapter explores hardening as one of the primary tools for securing the Operating System and the steps that are taken to do so. The additional security-related software one might use to secure the Systems, including anti-malware tools, software firewalls, and host-based intrusion detection Systems, in order to protect users from a variety of attacks, is also reviewed. The chapter finally touches on some of the security tools one can use from an Operating System perspective, including port scanners such as Nmap, vulnerability analysis tools such as Nessus, and exploit frameworks such as Metasploit.