Answer Posted / vinodh anandhan
A widely used technique for securing computer systems is to
execute programs inside protection domains that enforce
established security policies. These containers, often
referred to as sandboxes, come in a variety of forms.
Although current sandboxing techniques have individual
strengths, they also have limitations that reduce the scope
of their applicability. In this paper, we give a detailed
analysis of the options available to designers of
sandboxing mechanisms. As we discuss the tradeoffs of
various design choices, we present a sandboxing facility
that combines the strengths of a wide variety of design
alternatives. Our design provides a set of simple yet
powerful primitives that serve as a flexible, general-
purpose framework for confining untrusted programs. As we
present our work, we compare and contrast it with the work
of others and give preliminary results.
Vinodh Anandhan
Software Test Engineer
Bangalore
vinodhanandhan@gmail.com
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What is bug, deffect, issue, error?
What is PBX Testing & What is Test coverage?
Can list out some disadvantages of manual testing?
What are the RBI rules has to follow by a bank for online precesseing. ?
Is Anyone attended the manual testing interview with capgemini in recent past. please let me know the type of questions they can ask. Thanks
What is software configuration management?
Difference between adhoc testing and error guessing?
How do u determine,what to be tested?
Give the real-time example for back-to-back testing?
What is difference between Manual testing and Pega/BPM testing?
What is a bug triage?
what is e-tester?
Name three reasons why the tester may choose to record in Context Sensitive mode.
What is a defect?
what is a horizontal and vertical matrix explain with examples