KeyKOS
Results: 14
# | Item |
---|---|
11![]() | 8.Security Many of Joule’s security foundations were drawn from or inspired by KeyKOS, a capability-based operating system that provides NCSC (National Computer Security Center) B3-level security. Security can be thouAdd to Reading ListSource URL: www.erights.orgLanguage: English - Date: 2004-12-04 19:43:46 |
12![]() | 11.Persistence This section will describe possible implementations of persistence in Joule. The trade-offs between these implementations remain largely unexplored for Joule, though much of the territory is known for othAdd to Reading ListSource URL: www.erights.orgLanguage: English - Date: 2004-12-04 19:43:47 |
13![]() | Towards a Verified, General-Purpose Operating System Kernel† Jonathan Shapiro, Ph.D., Michael Scott Doerrie, Eric Northup, SwaroopAdd to Reading ListSource URL: www.coyotos.orgLanguage: English - Date: 2014-01-16 10:10:58 |
14![]() | PDF DocumentAdd to Reading ListSource URL: srl.cs.jhu.eduLanguage: English - Date: 2007-09-20 09:41:43 |