E-resources
Peer reviewed
Open access
-
Burtsev, Aleksandr G.; Polyansky, Aleksey V.; Savichev, Ilya I.
Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ, 09/2023, Volume: 30, Issue: 3Journal Article
The relevance of the present study is confirmed by the need for implementing technologies of program code, controlled execution for general-purpose systems and for systems, which are used in critical information infrastructure (CII). Technologies for implementing secure execution environments are one of the modern security mechanisms for protecting against the exploitation of vulnerabilities and ensuring the integrity and confidentiality of information. Approaches to the implementation of trusted program code execution and controlled software execution has been investigated. The advantages, disadvantages and limitations of the use of existing solutions are discussed. Aspects and methods for implementing this type of runtime environment, using the standard features of the GNU/Linux OS kernel are reviewed. A new method was introduced for implementing secured real-time code execution environments in the GNU/Linux OS family, expanding the capabilities of existing solutions for creating secure execution environments without using proprietary technologies. The obtained results can be considered for use in hardware-software systems and embedded systems under GNU/Linux OS.
Shelf entry
Permalink
- URL:
Impact factor
Access to the JCR database is permitted only to users from Slovenia. Your current IP address is not on the list of IP addresses with access permission, and authentication with the relevant AAI accout is required.
Year | Impact factor | Edition | Category | Classification | ||||
---|---|---|---|---|---|---|---|---|
JCR | SNIP | JCR | SNIP | JCR | SNIP | JCR | SNIP |
Select the library membership card:
If the library membership card is not in the list,
add a new one.
DRS, in which the journal is indexed
Database name | Field | Year |
---|
Links to authors' personal bibliographies | Links to information on researchers in the SICRIS system |
---|
Source: Personal bibliographies
and: SICRIS
The material is available in full text. If you wish to order the material anyway, click the Continue button.