Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,393,518 papers from all fields of science
Search
Sign In
Create Free Account
Chroot
Known as:
Chroot jails
, Jail (disambiguation)
, Chroot prison
Expand
A chroot on Unix operating systems is an operation that changes the apparent root directory for the current running process and its children. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Amavis
Cd (command)
Child process
Chrome OS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities
Noam Moscovich
,
Ron Bitton
,
+5 authors
A. Shabtai
arXiv.org
2020
Corpus ID: 220280420
The existence of a security vulnerability in a system does not necessarily mean that it can be exploited. In this research, we…
Expand
2017
2017
Managing Provenance of Implicit Data Flows in Scientific Experiments
Vitor C. Neves
,
Daniel de Oliveira
,
Kary A. C. S. Ocaña
,
V. Braganholo
,
Leonardo Gresta Paulino Murta
ACM Trans. Internet Techn.
2017
Corpus ID: 588005
Scientific experiments modeled as scientific workflows may create, change, or access data products not explicitly referenced in…
Expand
2016
2016
Towards Access Control for Isolated Applications
K. Belyaev
,
I. Ray
International Conference on Security and…
2016
Corpus ID: 16378968
With the advancements in contemporary multi-core CPU architectures, it is now possible for a server operating system (OS…
Expand
2012
2012
AllNet: using Social Connections to Inform Traffic Prioritization and Resource Allocation
Edoardo S. Biagioni
2012
Corpus ID: 10469529
AllNet is a new networking protocol designed to provide communication utilizing all available means, including Internet and…
Expand
2011
2011
Testing large-scale cloud management
D. Citron
,
Aviad Zlotnick
IBM Journal of Research and Development
2011
Corpus ID: 12919242
Testing for correctness and reliability is a major challenge in the development and deployment of cloud computing platforms…
Expand
2011
2011
PIGA-HIPS: Protection of a shared HPC cluster
M. Blanc
,
Jérémy Briffaut
,
C. Toinard
,
Damien Gros
2011
Corpus ID: 53348737
Protecting a shared High Performance Computing cluster is still an open research problem. Existing solutions deal with sand…
Expand
2009
2009
Implementation and Security of a Web-Based Unix Programming Environment
R. Perry
International Conference on Internet Computing
2009
Corpus ID: 16454376
The implementation and security provisions of a web–based Unix environment for C, Java, and shell programming are presented. In…
Expand
2007
2007
Improving Virtual Appliances through Virtual Layered File Systems
S. Potter
,
Jason Nieh
2007
Corpus ID: 61022762
The problem of managing computers is growing in complexity due to the increasing amount of physical and virtual computers that…
Expand
2006
2006
Accessing biodiversity resources in computational environments from workflow applications
J. S. Pahwa
,
R. J. White
,
+12 authors
S. Bhagwat
Works
2006
Corpus ID: 13097667
In the biodiversity world (BDW) project we have created a flexible and extensible Web services-based grid environment for…
Expand
2006
2006
iPoJ: User-Space Sandboxing for Linux 2.4
Brian Greskamp
,
Pablo Montesinos
,
Paul Sack
2006
Corpus ID: 2535214
The Internet is a dangerous place. Both na ı̈ve and educated users routinely become infected with viruses and accidentally run…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE