Process isolation

Known as: Multi process browser, Content chrome separation, Process-per-tab 
Process isolation is a set of different hardware and software technologies designed to protect each process from other processes on the operating… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1994-2016
024619942016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Modern operating systems provide a number of different mechanisms that allow processes to interact. These interactions can… (More)
  • table I
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Recent device hardware trends enable a new approach to the design of network server operating systems. In a traditional operating… (More)
  • figure 2
  • figure 1
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Many of today's web sites contain substantial amounts of client-side code, and consequently, they act more like programs than… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Current data protection technologies such as those based on public-key encryption and broadcast encryption focus on the secure… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Most operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Message-based communication offers the potential benefits of providing stronger specification and cleaner separation between… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2002
2002
Using cyclic debugging techniques for large-scale parallel programs is often prohibited by a program’s size and runtime and the… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
1999
1999
A TCB and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
1998
1998
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends… (More)
  • figure 1
  • figure 2
Is this relevant?