44:
capability is the MMU. (and potentially the embedded processors' hardware support for virtualization) which can restrict access to any memory addresseable device or software code/data space. 2. It might make sense to explicitly state that it's the
Embedded Hypervisors use of the MMU that provides security. But that begs the question as to how. Maybe there should be a related section in the Implementation section to further expand on this point? 3. There is a fleeting reference to security policies for communication between sub-systems. Again this needs expansion, some examples of the types of security policies for example? and again maybe a tie in section back to implementation?
22:
43:
I think the use case example under System
Security needs some explanation. There are three issues. 1. It talks about subsystems - are subsystems solely software modules or can they be hardware subsystems? I suspect both given that the primary supporting/implementation technology of the VM
87:
I agree. The lead paragraph should start with a definition of the term. If I could properly define it, I would edit this. What IS the definition, anyone??
159:
116:
72:
181:
29:
101:
As do I. Whoever wrote this must have never used
Knowledge before. That's hilarious. This isn't a journal, moron.
158:
This article was ahead of its time. The structure could be improved but, many years later, it is very relevant.
144:, but WTF is an "embedded hypervisor"? With my current understanding I see absolutely no point in this article.
163:
120:
76:
51:
106:
47:
115:
Updated lead paragraph to be more like a definition, and moved the existing paragraph into background (
92:
68:
102:
149:
141:
88:
175:
65:
The beginning of this page reads like an editorial and not like an encyclopedia.
145:
167:
153:
137:
124:
110:
96:
80:
55:
15:
28:This article has not yet been rated on Knowledge's
140:is, and think I also comprehend the properties of
8:
21:
19:
7:
14:
39:System Security needs explanation
20:
125:14:32, 17 September 2014 (UTC)
1:
56:12:29, 23 February 2009 (UTC)
154:13:49, 22 October 2013 (UTC)
198:
168:02:20, 10 March 2021 (UTC)
132:Is this article for real?
111:21:30, 21 July 2011 (UTC)
97:15:41, 3 April 2011 (UTC)
81:07:17, 7 March 2011 (UTC)
136:I do comprehend what a
182:Unassessed articles
30:content assessment
71:comment added by
36:
35:
189:
142:embedded systems
83:
25:
24:
23:
16:
197:
196:
192:
191:
190:
188:
187:
186:
172:
171:
134:
66:
63:
41:
12:
11:
5:
195:
193:
185:
184:
174:
173:
160:71.234.102.244
133:
130:
129:
128:
117:220.233.21.251
113:
99:
62:
61:Lead paragraph
59:
40:
37:
34:
33:
26:
13:
10:
9:
6:
4:
3:
2:
194:
183:
180:
179:
177:
170:
169:
165:
161:
156:
155:
151:
147:
143:
139:
131:
126:
122:
118:
114:
112:
108:
104:
103:Psychlohexane
100:
98:
94:
90:
86:
85:
84:
82:
78:
74:
73:50.46.201.106
70:
60:
58:
57:
53:
49:
48:Embeddowikier
45:
38:
31:
27:
18:
17:
157:
135:
64:
46:
42:
67:—Preceding
138:hypervisor
176:Category
69:unsigned
146:ScotXW
89:Madman
32:scale.
164:talk
150:talk
121:talk
107:talk
93:talk
77:talk
52:talk
178::
166:)
152:)
123:)
109:)
95:)
79:)
54:)
162:(
148:(
127:)
119:(
105:(
91:(
75:(
50:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.