An operating system architecture for organic computing in embedded real-time systems
FREE-DOWNLOAD F Kluge, J Mische, S Uhrig… – Autonomic and Trusted …, 2010
… The same applies for an excessive or uncon- trolled use of system memory. To prevent such
situations, a Security Management provides several stages of privileges. If an Some of
service is invoked, the OS first checks the calling application’s privileges before