An operating system architecture for organic computing in embedded real-time systems



FREE-DOWNLOAD F Kluge, J Mische, S Uhrig… – Autonomic and Trusted …, 2010
… The same applies for an excessive or uncon- trolled use of system memory. To prevent such
situations, a Security Management provides several stages of privileges. If an  Some of

service is invoked, the OS first checks the calling application’s privileges before