KeyKOS

Results: 14



#Item
1System Enforced Transitive Read-Only Objects in KeyKOS-like Systems 1

System Enforced Transitive Read-Only Objects in KeyKOS-like Systems 1

Add to Reading List

Source URL: pwpconsult.com

Language: English - Date: 2010-11-29 21:12:56
    2The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

    The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

    Add to Reading List

    Source URL: cap-lore.com

    Language: English - Date: 2009-05-04 18:57:36
      3The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

      The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

      Add to Reading List

      Source URL: www.cap-lore.com

      Language: English - Date: 2009-05-04 18:57:36
      411.Persistence  This section will describe possible implementations of persistence in Joule. The trade-offs between these implementations remain largely unexplored for Joule, though much of the territory is known for oth

      11.Persistence This section will describe possible implementations of persistence in Joule. The trade-offs between these implementations remain largely unexplored for Joule, though much of the territory is known for oth

      Add to Reading List

      Source URL: erights.org

      Language: English - Date: 2004-12-04 19:43:47
      58.Security  Many of Joule’s security foundations were drawn from or inspired by KeyKOS, a capability-based operating system that provides NCSC (National Computer Security Center) B3-level security. Security can be thou

      8.Security Many of Joule’s security foundations were drawn from or inspired by KeyKOS, a capability-based operating system that provides NCSC (National Computer Security Center) B3-level security. Security can be thou

      Add to Reading List

      Source URL: erights.org

      Language: English - Date: 2004-12-04 19:43:46
      6Differences Between Coyotos and EROS — A Quick Summary† Version 0.3, revised 2 April 2006 Jonathan Shapiro, Ph.D. Systems Research Laboratory Dept. of Computer Science

      Differences Between Coyotos and EROS — A Quick Summary† Version 0.3, revised 2 April 2006 Jonathan Shapiro, Ph.D. Systems Research Laboratory Dept. of Computer Science

      Add to Reading List

      Source URL: www.coyotos.org

      Language: English - Date: 2014-08-13 02:11:08
      7Coyotos Microkernel Specification Version 0.6+ Jonathan S. Shapiro, Ph.D., Jonathan W. Adams The EROS Group, LLC September 10, 2007

      Coyotos Microkernel Specification Version 0.6+ Jonathan S. Shapiro, Ph.D., Jonathan W. Adams The EROS Group, LLC September 10, 2007

      Add to Reading List

      Source URL: www.coyotos.org

      Language: English - Date: 2014-08-13 02:09:56
      8Debunking Linus’s Latest Jonathan Shapiro, Ph.D. Systems Research Laboratory Dept. of Computer Science Johns Hopkins University May 11, 2006

      Debunking Linus’s Latest Jonathan Shapiro, Ph.D. Systems Research Laboratory Dept. of Computer Science Johns Hopkins University May 11, 2006

      Add to Reading List

      Source URL: www.coyotos.org

      Language: English - Date: 2014-08-13 02:11:11
      9focus  building software securely EROS: A Principle-Driven Operating System from the

      focus building software securely EROS: A Principle-Driven Operating System from the

      Add to Reading List

      Source URL: www.eros-os.org

      Language: English - Date: 2005-10-18 08:59:18
      10ReViveI/O: Efficient Handling of I/O in Highly-Available Rollback-Recovery Servers Jun Nakano✢, Pablo Montesinos, Kourosh Gharachorloo❆, Josep Torrellas University of Illinois at Urbana-Champaign

      ReViveI/O: Efficient Handling of I/O in Highly-Available Rollback-Recovery Servers Jun Nakano✢, Pablo Montesinos, Kourosh Gharachorloo❆, Josep Torrellas University of Illinois at Urbana-Champaign

      Add to Reading List

      Source URL: iacoma.cs.uiuc.edu

      Language: English - Date: 2010-12-24 13:13:25