KeyKOS

Results: 14



#Item
11Email forwarding / Server

8.Security Many of Joule’s security foundations were drawn from or inspired by KeyKOS, a capability-based operating system that provides NCSC (National Computer Security Center) B3-level security. Security can be thou

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2004-12-04 19:43:46
12Persistence / Object-relational mapping / KeyKOS / Java platform / Java Persistence API / Computing / Java enterprise platform / Computer programming

11.Persistence This section will describe possible implementations of persistence in Joule. The trade-offs between these implementations remain largely unexplored for Joule, though much of the territory is known for oth

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2004-12-04 19:43:47
13Coyotos / EROS / Microkernel / Capability-based security / Kernel / L4 microkernel family / KeyKOS / Persistence / Mach / Computer architecture / Computing / Computer security

Towards a Verified, General-Purpose Operating System Kernel† Jonathan Shapiro, Ph.D., Michael Scott Doerrie, Eric Northup, Swaroop

Add to Reading List

Source URL: www.coyotos.org

Language: English - Date: 2014-01-16 10:10:58
14Capability-based security / Object-capability model / EROS / Access Control Matrix / Ambient authority / C-list / Infrastructure optimization / Confused deputy problem / KeyKOS / Security / Computer security / Access control

PDF Document

Add to Reading List

Source URL: srl.cs.jhu.edu

Language: English - Date: 2007-09-20 09:41:43
UPDATE