Speedos Security
by Prof. Dr. Dr. J. L. Keedy
  1. Speedos Security - Official Homepage
  2. Search
Skip navigation
  • Speedos Security
  • Secure Operating Systems
  • Capability Systems and RISC Systems
  • Introduction to SPEEDOS
    • Background of the SPEEDOS Operating System Design
    • The MONADS Project
    • The SPEEDOS Project
  • Information Hiding
    • Advantages of the Information Hiding Principle
    • Information Hiding Objects
    • Semantic Files
  • Persistent Virtual Memory
  • Unique Identifiers
    • Worldwide Unique Virtual Addresses
    • Translating Virtual Addresses into Main Memory Addresses
  • Protection
    • Capabilities
    • Qualifier Based Protection
    • Further Protection Techniques
  • Process Design
    • In-Process Design
    • Processes and Multithreading
    • Logging In and Out
  • The Internet
  • Some Further Protection Techniques
  • POSTSCRIPT
    • The Costs of Existing Systems
    • Some Examples
    • Complexity and Simplicity
    • Some Advantages of the SPEEDOS Approach
  • References
  • Downloads
  • Downloads June 2025

Skip navigation
  • Datenschutzerklärung

Search results

Options
Diese Website verwendet Cookies, um Ihnen die bestmögliche Funktionalität bieten zu können. Mehr Erfahren