Abstract:
A method for depositing a conductive polymeric material that has a charge/hole- transport property onto a substrate. In one embodiment, the method comprises the steps of providing a solution having the conductive polymeric material, a first solvent element with a vibrational mode and a second solvent element with a vibrational mode; freezing the solution to form a target; directing light of a wavelength in the infrared region which is resonant with one of the vibrational mode of the first solvent element and the vibrational mode of the second solvent element to vaporize the target; vaporizing the conductive polymeric material in the target with the light without substantially changing the charge/hole-transport property of the conductive polymeric material; and depositing the vaporized conductive polymeric material on the substrate to form a film of the conductive polymeric material..
Abstract:
A method for depositing a conductive polymeric material that has a charge/hole- transport property onto a substrate. In one embodiment, the method comprises the steps of providing a solution having the conductive polymeric material, a first solvent element with a vibrational mode and a second solvent element with a vibrational mode; freezing the solution to form a target; directing light of a wavelength in the infrared region which is resonant with one of the vibrational mode of the first solvent element and the vibrational mode of the second solvent element to vaporize the target; vaporizing the conductive polymeric material in the target with the light without substantially changing the charge/hole-transport property of the conductive polymeric material; and depositing the vaporized conductive polymeric material on the substrate to form a film of the conductive polymeric material..
Abstract:
A computer-implemented method is presented that allows a user to receive a work such as a movie at any time and at any location. A first client connects to a server through a network. A work is selected through the first client. Transaction data related to a user's right to receive a work is created and stored. A request is sent to the server to transmit the work. The work is transmitted to either the first or the second clients at any time based upon the user's right to receive the work.
Abstract:
Access control is mediated by a set of 2-tuple labels or attributes which are associated with subject and object entities, respectively. Subject entitles, such as processes, have separate read and write attributes, while object entities, such as files, have separate integrity and write control attributes. The system implements a set of rules to provide both integrity control and confidentiality protection. Specifically, write operations to an object are inhibited where the subject's write attribute is lower than the write control attribute of the object. Read operations from an object are inhibited where the subject's read attribute is lower than the object's integrity attribute. When a subject reads from an object having a lower integrity level than the subject's read attribute, the subject's read attribute is demoted.
Abstract:
A mandatory access control method for securing an operating system is presented. A first integrity subject reads a first object. The first integrity subject attempts to read a second object. It is determinated that a conflict exists between the first and second objects. At least one security rule is applied to the conflict between the first and the second objects.
Abstract:
A method is provided for replacing a loadable software module in an operating system. The method includes: maintaining a reference count for a loadable software module associated with a kernel of the operating system (12); linking a replacement software module for the loadable software module into the kernel of the operating system (14); receiving a resource request for the loadable software module after the replacement software module is linked into the kernel; and directing the resource request for the loadable software module to the replacement software module (18). The method may further include unlinking the loadable software module from the kernel of the operating system when there are no longer any active references to the loadable module (19).
Abstract:
A security architecture is provided for accessing security components associated with an operating system. The security architecture is generally comprised of: a policy tree storing a plurality of security policies, where each security policy is define as at least one system call which correlates to a security operation and a corresponding security component for executing the security operation; and a policy manager adapted to intercept system calls from the operating system and operable to determine an applicable response based on the policy tree. The policy tree and the policy manager reside in a protected memory space of the execution environment.
Abstract:
A method is provided for replacing a loadable software module in an operating system. The method include: maintaining a reference count for a loadable software module associated with a kernel of the operating system; linking a replacement software module for the loadable software module into the kernel of the operating system; receiving a resource request for the loadable software module after the replacement software module is linked into the kernel; and directing the resource request for the loadable software module to the replacement software module. The method may further include unlinking the loadable software module from the kernel of the operating system when there are no longer any active references to the loadable module.
Abstract:
A computer-implemented method is presented that allows a user to receive a work such as a movie at any time and at any location. A first client connects to a server through a network. A work is selected through the first client. Transaction data related to a user's right to receive a work is created and stored. A request is sent to the server to transmit the work. The work is transmitted to either the first or the second clients at any time based upon the user's right to receive the work.
Abstract:
Access control is mediated by a set of 2-tuple labels or attributes which are associated with subject and object entities, respectively. Subject entitles, such as processes, have separate read and write attributes, while object entities, such as files, have separate integrity and write control attributes. The system implements a set of rules to provide both integrity control and confidentiality protection. Specifically, write operations to an object are inhibited where the subject's write attribute is lower than the write control attribute of the object. Read operations from an object are inhibited where the subject's read attribute is lower than the object's integrity attribute. When a subject reads from an object having a lower integrity level than the subject's read attribute, the subject's read attribute is demoted.