Home |
EROS (10) Categories:
See Also:
Sites:
» CapROS
Capability-based Reliable Operating System; home site; non-academic evolution and continuation of EROS system, begun in 2005; EROS was pure research, CapROS is intended to be stable commercial quality system. http://www.capros.org/ » Coyotos
Growing article, with links to many related topics. Wikipedia. http://en.wikipedia.org/wiki/Coyotos » Coyotos Secure Operating System
Direct EROS research successor; builds on those ideas and experiences; much code developed for EROS will migrate directly to Coyotos. http://www.coyotos.org/ » EROS-OS.org
Extremely Reliable OS; home site. Small, secure, real-time microkernel with orthogonal persistence: pull the plug and restart with no losses. Related to, and working with, ERights.org on E programming language. [Open source, GPL] http://www.eros-os.org/ » EROS: A Fast Capability System
This capability-based OS for commodity processors uses a one level storage model; store persistence is transparent to applications. Surprisingly, performance of this very high security system matches normal OSs. [ResearchIndex] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.400 » EROS: A Principle-Driven Operating System from the Ground Up
Abstract of article by Jonathan S. Shapiro, Norm Hardy; published by IEEE Computer Society. [IEEE Software] http://csdl2.computer.org/persagen/DLAbsToc.jsp?resourcePath=/dl/mags/so/&toc=comp/mags/so/2002/01/s1toc.xml&DOI=10.1109/52.976938 » Extremely Reliable Operating System
Growing article, with links to many related topics. Wikipedia. http://en.wikipedia.org/wiki/Extremely_Reliable_Operating_System » The EROS Alternative
Shapiro interview in 'Open-Source Security' issue. Of open source OSs, most people think only Linux and OpenBSD. But another open-source OS's architecture may be more secure than either of them. [Information Security Magazine] http://www.infosecuritymag.com/articles/february00/covera.shtml » Verifying Operating System Security
A confined program is one unable to leak information to an unauthorized party or modify unauthorized resources, an essential feature of any secure component based system. A proof of correctness of EROS architecture for confinement. [ResearchIndex] http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.44.4902 This category needs an editor
Last Updated: 2007-08-27 03:13:31
The content of this directory is based on the Open Directory and has been modified by GoSearchFor.com |