Speedos Security
by Prof. Dr. Dr. J. L. Keedy
Speedos Security - Official Homepage
Search
Keywords
Toggle theme
Light
Dark
Auto
Skip navigation
Speedos Security
Secure Operating Systems
Capability Systems and RISC Systems
Introduction to SPEEDOS
Background of the SPEEDOS Operating System Design
The MONADS Project
The SPEEDOS Project
Information Hiding
Advantages of the Information Hiding Principle
Information Hiding Objects
Semantic Files
Persistent Virtual Memory
Unique Identifiers
Worldwide Unique Virtual Addresses
Translating Virtual Addresses into Main Memory Addresses
Protection
Capabilities
Qualifier Based Protection
Further Protection Techniques
Process Design
In-Process Design
Processes and Multithreading
Logging In and Out
The Internet
Some Further Protection Techniques
POSTSCRIPT
The Costs of Existing Systems
Some Examples
Complexity and Simplicity
Some Advantages of the SPEEDOS Approach
References
Downloads
Skip navigation
Contact
Datenschutzerklärung
Search results
Keywords
Options
match all words
match any word
Match exact search phrase
Submit
Diese Website verwendet Cookies, um Ihnen die bestmögliche Funktionalität bieten zu können.
Mehr Erfahren
Akzeptieren