Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Process isolation

Known as: Multi process browser, Content chrome separation, Process-per-tab 
Process isolation is a set of different hardware and software technologies designed to protect each process from other processes on the operating… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
As network, I/O, accelerator, and NVM devices capable of a million operations per second make their way into data centers, the… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2019
2019
Recent attacks have broken process isolation by exploiting microarchitectural side channels that allow indirect access to shared… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2019
2019
Isolating sensitive state and data can increase the security and robustness of many applications. Examples include protecting… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4
Is this relevant?
2018
2018
Many applications can benefit from isolating sensitive data in a secure library. Examples include protecting cryptographic keys… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Recent device hardware trends enable a new approach to the design of network server operating systems. In a traditional operating… Expand
  • figure 2
  • figure 1
  • table 1
  • table 2
  • figure 3
Is this relevant?
2009
2009
Multi-Systems and methods for process browser architecture are described herein. In the embodiment, the multi-system to provide a… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Most operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Message-based communication offers the potential benefits of providing stronger specification and cleaner separation between… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2002
2002
Using cyclic debugging techniques for large-scale parallel programs is often prohibited by a program's size and runtime and the… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?