KeyKOS

Results: 14



#Item
1

System Enforced Transitive Read-Only Objects in KeyKOS-like Systems 1

Add to Reading List

Source URL: pwpconsult.com

Language: English - Date: 2010-11-29 21:12:56
    2

    The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

    Add to Reading List

    Source URL: cap-lore.com

    Language: English - Date: 2009-05-04 18:57:36
      3Microkernel / Capability-based security / Domain / Key / Windows key / Kernel / Function key / EROS / Memory protection / Computer architecture / Security / KeyKOS

      The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

      Add to Reading List

      Source URL: www.cap-lore.com

      Language: English - Date: 2009-05-04 18:57:36
      4Persistence / Object-relational mapping / KeyKOS / Java platform / Java Persistence API / Computing / Java enterprise platform / Computer programming

      11.Persistence This section will describe possible implementations of persistence in Joule. The trade-offs between these implementations remain largely unexplored for Joule, though much of the territory is known for oth

      Add to Reading List

      Source URL: erights.org

      Language: English - Date: 2004-12-04 19:43:47
      5Email forwarding / Server

      8.Security Many of Joule’s security foundations were drawn from or inspired by KeyKOS, a capability-based operating system that provides NCSC (National Computer Security Center) B3-level security. Security can be thou

      Add to Reading List

      Source URL: erights.org

      Language: English - Date: 2004-12-04 19:43:46
      6Coyotos / Capability-based security / KeyKOS / Persistence / CapROS / Kernel / Mach / Ring / Operating system / Computer architecture / Computing / EROS

      Differences Between Coyotos and EROS — A Quick Summary† Version 0.3, revised 2 April 2006 Jonathan Shapiro, Ph.D. Systems Research Laboratory Dept. of Computer Science

      Add to Reading List

      Source URL: www.coyotos.org

      Language: English - Date: 2014-08-13 02:11:08
      7Microkernel / Capability-based security / L4 microkernel family / Kernel / GNU Hurd / KeyKOS / Mach / Persistence / Ring / Computer architecture / Coyotos / EROS

      Coyotos Microkernel Specification Version 0.6+ Jonathan S. Shapiro, Ph.D., Jonathan W. Adams The EROS Group, LLC September 10, 2007

      Add to Reading List

      Source URL: www.coyotos.org

      Language: English - Date: 2014-08-13 02:09:56
      8EROS / Microkernel / L4 microkernel family / Coyotos / Kernel / Paravirtualization / KeyKOS / MINIX / CapROS / Computer architecture / System software / Real-time operating systems

      Debunking Linus’s Latest Jonathan Shapiro, Ph.D. Systems Research Laboratory Dept. of Computer Science Johns Hopkins University May 11, 2006

      Add to Reading List

      Source URL: www.coyotos.org

      Language: English - Date: 2014-08-13 02:11:11
      9EROS / Capability-based security / Kernel / Operating system / Principle of least privilege / KeyKOS / Trusted computing base / Persistence / Ring / Computer architecture / Computing / Computer security

      focus building software securely EROS: A Principle-Driven Operating System from the

      Add to Reading List

      Source URL: www.eros-os.org

      Language: English - Date: 2005-10-18 08:59:18
      10Application checkpointing / RAID / Fault-tolerant system / KeyKOS / Fault-tolerant design / Fault-tolerant computer systems / Computing / Computer engineering

      ReViveI/O: Efficient Handling of I/O in Highly-Available Rollback-Recovery Servers Jun Nakano✢, Pablo Montesinos, Kourosh Gharachorloo❆, Josep Torrellas University of Illinois at Urbana-Champaign

      Add to Reading List

      Source URL: iacoma.cs.uiuc.edu

      Language: English - Date: 2010-12-24 13:13:25
      UPDATE