computer systems theory, technology, and applications

357 627 0
computer systems theory, technology, and applications

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... security, and in computer systems it appears in many guises and in many places Applications, virtual machines, operating systems, and firewalls often have their own access-control machinery, with their own idiosyncrasies, bugs, and loopholes Physical protection, at the level of doors or wires, is another form of access control Over the years, there have been many small and large efforts to unify models and. .. Laboratory’s “halcyon days”—an expanding Laboratory and no external interference Though the Laboratory’s strength was in systems, and Roger himself was a systems scientist, he encouraged new areas to develop, for example, formal methods, and language and information processing One topic of research Roger particularly promoted at Cambridge was the intersection of multimedia systems and networking As a result,... known as the Computer Laboratory—in 1962, as a Senior Assistant in Research Although his Ph.D was on an applications topic, Roger’s career has been that of a classic—almost prototypical— systems computer scientist It is hard to pin him down to a single area Roger has made significant contributions to areas such as operating systems, networking, distributed systems, computer security and multimedia... appeared for the meeting, apart from some minor corrections and some small modifications, necessary in the circumstances, to specific references to Roger These papers address issues over the whole area of computer systems, from hardware through operating systems and middleware to applications, with their languages and their implementations, and from devices to global networks; also from many points... where teleconferencing and video mail became regular tools for research Roger continued in the 1980s and 90s to be interested in all aspects of computer systems, but was especially concerned with security He participated in every one of the ACM Symposia on Operating Systems Principles, and is believed to be the only person to have achieved a 100% attendance record With Ross Anderson and others he significantly... England Jim Gray Alan Bundy Microsoft Research, San Francisco, CA, USA University of Edinburgh, Scotland David Hartley Mike Burrows Cambridge, England Google Research, Mountain View, CA, USA Andrew Herbert Luca Cardelli Microsoft Research Ltd, Cambridge, England Microsoft Research Ltd, Cambridge, England Tony Hoare David Clark Microsoft Research Ltd, Cambridge, England MIT, Cambridge, MA, USA Andy... Tennenhouse and others on the Universe and Unison projects, where independent Cambridge Rings that sat at several UK sites were interconnected by satellite (Universe) and high-speed point-to-point links (Unison) to demonstrate wide-area distributed computing Both rings were used to do real-time voice and video applications (the Cambridge “Island” project)— another “first.” There were several commercial and. .. CA, USA Ross Anderson Dorothy Denning University of Cambridge, England Naval Postgraduate School, Monterey, CA, USA Jean Bacon University of Cambridge, England Peter Denning Andrew Birrell Naval Postgraduate School, Monterey, CA, USA Microsoft Research—Silicon Valley, CA, USA Sandy Fraser Bernardsville, NJ, USA Christopher Bishop Microsoft Research Ltd, Cambridge, England Li Gong Sun Microsystems, Santa... between users and the operating system, and between operating system modules From the early 1970s he worked with Maurice Wilkes and David Wheeler on the design and construction of the CAP computer, an experimental machine with memory protection based on capabilities implemented in hardware Once the machine was running in 1975, Roger then led the development of the machine’s operating system and was responsible... it will enable the people who want to get on and make things to do it better and to do it more quickly and to do it with less mistakes and all of this is good: but at the end of the day I am a engineer— and so saying, he put on his engineer’s hard hat He died less than two weeks later, on March 1st Roger’s last major talk was his Clifford Paterson Lecture Computer security?’ at The Royal Society in . Data Herbert, A.J. (Andrew J.), 1954– Computer systems: theory, technology, and applications/ [edited by] Andrew J. Herbert, Karen I.B. Spa ¨ rck Jones p. cm. — (Monographs in computer science) Includes. Monographs in Computer Science Editors David Gries Fred B. Schneider This page intentionally left blank Andrew Herbert Karen Spa ¨ rck Jones Editors Computer Systems Theory, Technology, and Applications A. because you can’t expect it to hap- pen by itself and you can’t go and build computer systems with any complex- ity at all without some formalised understanding to fall back on. xii Preface It is an

Ngày đăng: 31/05/2014, 23:49

Từ khóa liên quan

Mục lục

  • Computer Systems: Theory, Technology, and Applications : A Tribute to Roger Needham

    • Cover

    • Contents

    • Preface

    • Roger Needham: 50 + 5 Meeting Programme

    • Contributors

    • Introduction: Roger Needham

    • 1 On Access Control, Data Integration, and Their Languages

    • 2 Protocol Analysis, Composability and Computation

    • 3 Access Control in Distributed Systems

    • 4 Implementing Condition Variables with Semaphores

    • 5 Clumps, Clusters and Classification

    • 6 How to Implement Unnecessary Mutexes

    • 7 Bioware Languages

    • 8 The Economics of Open Systems

    • 9 From Universe to Global Internet

    • 10 Needham-Schroeder Goes to Court

    • 11 The Design of Reliable Operating Systems

    • 12 An Historical Connection between Time-Sharing and Virtual Circuits

    • 13 On Cross-Platform Security

    • 14 Distributed Computing Economics

Tài liệu cùng người dùng

Tài liệu liên quan