{"id":"https://openalex.org/W1981536862","doi":"https://doi.org/10.1145/2047456.2047460","title":"Measures to improve security in a microkernel operating system","display_name":"Measures to improve security in a microkernel operating system","publication_year":2011,"publication_date":"2011-09-30","ids":{"openalex":"https://openalex.org/W1981536862","doi":"https://doi.org/10.1145/2047456.2047460","mag":"1981536862"},"language":"en","primary_location":{"id":"doi:10.1145/2047456.2047460","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2047456.2047460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 Information Security Curriculum Development Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072612873","display_name":"Durga Vemuri","orcid":null},"institutions":[{"id":"https://openalex.org/I88447708","display_name":"Kentucky State University","ror":"https://ror.org/05xh8jn56","country_code":"US","type":"education","lineage":["https://openalex.org/I88447708"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Durga Vemuri","raw_affiliation_strings":["Kentucky State University, East Main, KY","Kentucky State University, East Main, KY#TAB#"],"affiliations":[{"raw_affiliation_string":"Kentucky State University, East Main, KY","institution_ids":["https://openalex.org/I88447708"]},{"raw_affiliation_string":"Kentucky State University, East Main, KY#TAB#","institution_ids":["https://openalex.org/I88447708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086450980","display_name":"Wasim A. Al-Hamdani","orcid":"https://orcid.org/0000-0003-3249-6883"},"institutions":[{"id":"https://openalex.org/I88447708","display_name":"Kentucky State University","ror":"https://ror.org/05xh8jn56","country_code":"US","type":"education","lineage":["https://openalex.org/I88447708"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wasim Al-Hamdani","raw_affiliation_strings":["Kentucky State University, East Main, KY","Kentucky State University, East Main, KY#TAB#"],"affiliations":[{"raw_affiliation_string":"Kentucky State University, East Main, KY","institution_ids":["https://openalex.org/I88447708"]},{"raw_affiliation_string":"Kentucky State University, East Main, KY#TAB#","institution_ids":["https://openalex.org/I88447708"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072612873"],"corresponding_institution_ids":["https://openalex.org/I88447708"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06900725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/microkernel","display_name":"Microkernel","score":0.992562472820282},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.7693322896957397},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.761596143245697},{"id":"https://openalex.org/keywords/user-space","display_name":"User space","score":0.6515616178512573},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.588646650314331},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5463982820510864},{"id":"https://openalex.org/keywords/embedded-operating-system","display_name":"Embedded operating system","score":0.45279204845428467},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.41222625970840454},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34859341382980347},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.13730117678642273}],"concepts":[{"id":"https://openalex.org/C2777127024","wikidata":"https://www.wikidata.org/wiki/Q726378","display_name":"Microkernel","level":2,"score":0.992562472820282},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.7693322896957397},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.761596143245697},{"id":"https://openalex.org/C2775877400","wikidata":"https://www.wikidata.org/wiki/Q1142183","display_name":"User space","level":2,"score":0.6515616178512573},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.588646650314331},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5463982820510864},{"id":"https://openalex.org/C35939892","wikidata":"https://www.wikidata.org/wiki/Q1139923","display_name":"Embedded operating system","level":3,"score":0.45279204845428467},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.41222625970840454},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34859341382980347},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.13730117678642273}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2047456.2047460","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2047456.2047460","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 Information Security Curriculum Development Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W5005926","https://openalex.org/W1481692486","https://openalex.org/W2016714907","https://openalex.org/W2019404692","https://openalex.org/W2020256407","https://openalex.org/W2027168655","https://openalex.org/W2058200237","https://openalex.org/W2104634303","https://openalex.org/W2166004296","https://openalex.org/W2470007019","https://openalex.org/W2528812583","https://openalex.org/W4206796831","https://openalex.org/W4239509106"],"related_works":["https://openalex.org/W2221664041","https://openalex.org/W2373570725","https://openalex.org/W3021151935","https://openalex.org/W2003033368","https://openalex.org/W4385504785","https://openalex.org/W3100598454","https://openalex.org/W1536013517","https://openalex.org/W2370681903","https://openalex.org/W2169596135","https://openalex.org/W2167270386"],"abstract_inverted_index":{"An":[0],"operating":[1,23,78,109,123,173],"system":[2,110,124,130,164],"forms":[3],"the":[4,9,56,66,74,104,129,138,153],"foundation":[5],"for":[6],"all":[7,73],"of":[8,68,99,117],"user's":[10],"computer":[11],"activities.":[12],"Therefore,":[13],"it":[14],"should":[15],"be":[16,49],"trustworthy":[17],"and":[18,28,43,64,134,144,155,165],"function":[19],"flawlessly.":[20],"Unfortunately,":[21],"today's":[22],"systems,":[24],"such":[25],"as":[26,179],"Windows":[27],"Linux,":[29],"fail":[30],"to":[31,33,89,146,158,176],"deliver":[32],"this":[34],"ideal,":[35],"because":[36,137],"they":[37],"suffer":[38],"from":[39],"fundamental":[40],"design":[41,83],"flaws":[42],"bugs.":[44],"Their":[45],"monolithic":[46],"kernel":[47],"tend":[48],"overloaded":[50],"with":[51,72],"functionality":[52,111],"that":[53,84,101],"runs":[54,102],"at":[55,103],"highest":[57,105],"privilege":[58,106],"level.":[59,107],"This":[60,150],"easily":[61],"introduces":[62],"bugs":[63],"breaches":[65],"Principle":[67],"Least":[69],"Authorization":[70],"(POLA)":[71],"related":[75],"risks.":[76],"Microkernel":[77,162],"systems":[79],"have":[80],"a":[81,96],"different":[82],"makes":[85],"them":[86],"less":[87,132],"vulnerable":[88],"these":[90],"problems.":[91],"A":[92],"microkernel":[93,172],"provides":[94],"only":[95],"minimal":[97],"set":[98],"abstractions":[100],"Extended":[108],"is":[112],"typically":[113],"available":[114],"by":[115],"means":[116],"user-space":[118],"servers.":[119],"By":[120],"splitting":[121],"an":[122],"into":[125],"small,":[126],"independent":[127],"parts,":[128],"becomes":[131],"complex":[133],"more":[135,142],"robust,":[136],"smaller":[139],"parts":[140],"are":[141],"manageable":[143],"help":[145],"isolate":[147],"faults,":[148],"respectively.":[149],"paper":[151],"reviews":[152],"concepts":[154],"mechanisms":[156],"used":[157],"improve":[159],"security":[160,178],"in":[161,167],"Operating":[163],"described":[166],"brief":[168],"about":[169],"two":[170],"real-world":[171],"system,":[174],"trying":[175],"achieve":[177],"its":[180],"goal.":[181]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
