Speedos Security
by Prof. Dr. Dr. J. L. Keedy
  1. Speedos Security - Official Homepage
  2. Downloads June 2025
Skip navigation
  • Speedos Security
  • Secure Operating Systems
  • Capability Systems and RISC Systems
  • Introduction to SPEEDOS
    • Background of the SPEEDOS Operating System Design
    • The MONADS Project
    • The SPEEDOS Project
  • Information Hiding
    • Advantages of the Information Hiding Principle
    • Information Hiding Objects
    • Semantic Files
  • Persistent Virtual Memory
  • Unique Identifiers
    • Worldwide Unique Virtual Addresses
    • Translating Virtual Addresses into Main Memory Addresses
  • Protection
    • Capabilities
    • Qualifier Based Protection
    • Further Protection Techniques
  • Process Design
    • In-Process Design
    • Processes and Multithreading
    • Logging In and Out
  • The Internet
  • Some Further Protection Techniques
  • POSTSCRIPT
    • The Costs of Existing Systems
    • Some Examples
    • Complexity and Simplicity
    • Some Advantages of the SPEEDOS Approach
  • References
  • Downloads
  • Downloads June 2025

Skip navigation
  • Contact
  • Datenschutzerklärung

Further Downloads from June 2025

  • digital-money-in-speedos.pdf (37.1 KiB)
  • persistent-programming-with-speedos-and-timor.pdf (155.9 KiB)
  • protecting-and-confining-information-with-speedos.pdf (152.0 KiB)
  • speedos-in-the-internet.pdf (20.6 KiB)
  • stopping-ransomware-the-SPEEDOS-solution-NEW.pdf (347.9 KiB)
  • why-speedos-executes-threads-entirely in-process.pdf (32.2 KiB)
Diese Website verwendet Cookies, um Ihnen die bestmögliche Funktionalität bieten zu können. Mehr Erfahren