Filters








2,552 Hits in 2.5 sec

The reference monitor

Terry Rooker
1993 Proceedings on the 1992-1993 workshop on New security paradigms - NSPW '92-93  
Figure 1 : 1 Figure 1: WindowsNT architecture [61 Figure 2 : 2 Figure 2: Mach architecture [71 Figure 3 : 3 Figure 3: Hurd architecture [41 Figure 4 : 4 Figure 4: Domain Separation Kernel Concept  ...  For example, the BSD interface in Mach 2.5 is just a server in Mach 3.0. This architecture is displayed in figure 2 . The GNU Hurd is an example of a system built (building?)  ... 
doi:10.1145/283751.283847 dblp:conf/nspw/Rooker93a fatcat:tc2vnf22zbcithsrri5pxro5b4

Mini track: 'peer-to-peer ecommerce systems and applications'

K. Aberer, J.-H. Morin, A.M. Ouksel
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
Peer-to-Peer computing is characterized by an increasing decentralization and autonomy of components thus leading to a new paradigm of distributed computing requiring new approaches and patterns.  ...  The third paper "Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries" by Mache, Ely, Gilbert, Gimba, Lopez and Wilkinson addresses a fundamental weakness  ...  Peer-to-Peer computing is characterized by an increasing decentralization and autonomy of components thus leading to a new paradigm of distributed computing requiring new approaches and patterns.  ... 
doi:10.1109/hicss.2004.1265680 dblp:conf/hicss/AbererMO04 fatcat:vfwkk5c56jgzjayuhhmuvm7h4y

Security architectures revisited

Hermann Härtig
2002 Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10  
The knowledge in technologies needed to build secure platforms, or Security Architectures, has significantly matured over the recent years.  ...  Classical security architectures Trusted Mach [2] (T-Mach) is a careful implementation of multi-level security.  ...  Examples include DSSA (Digital Systems Security Architecture [5] ), Trusted Mach [2] , and BSA (BirliX Security Architecture [7] ).  ... 
doi:10.1145/1133373.1133376 dblp:conf/sigopsE/Hartig02 fatcat:rwp6m2qmmraclcf2nwjdltr2ja

Intelligent computing in engineering and architecture

Ian F.C. Smith
2008 Advanced Engineering Informatics  
Behzadan From SEEKing Knowledge to Making Connections: Challenges, Approaches and Architectures for Distributed Process Integration 500 William J.  ...  Garrett Jr., Burcu Akinci, Scott Matthews, Chris Gordon, Hongjun Wang, Vipul Singhvi Understanding Situated Design Computing and Constructive Memory: Newton, Mach, Einstein and Quantum Mechanics 285 John  ... 
doi:10.1016/j.aei.2007.08.004 fatcat:wpn6f2bcfnfytmf5jschoa3ele

Hypersonic: Model Analysis and Checking in the Cloud

Vlad Acretoaie, Harald Störrle
2014 International Conference on Software Technologies: Applications and Foundations  
Objective: In this paper we investigate the conceptual and technical feasibility of a new software architecture for modeling tools, where certain advanced features are factored out of the client and moved  ...  Using features implemented in the existing Model Analysis and Checking (MACH) tool, we create a RESTful Web service API offering model analysis facilities. We refer to it as the Hypersonic API.  ...  associated tools (Chapter 2), propose a distributed architecture to satisfy these requirements (Chapter 3), and report on a proof-of-concept implementation (Chapter 4).  ... 
dblp:conf/staf/AcretoaieS14 fatcat:4rifo5rpmvgsvjpdtcvh445zme

On micro-kernel construction

J. Liedtke
1995 ACM SIGOPS Operating Systems Review  
Example -IBM Workplace OS / Mach ARM PowerPC MIPS Alpha IA32 Mach Microkernel Default Pager Device Support Bootstrap Name Service File Server Network Service Security Power Management  ...  Distributed policy and mechanism -ACL-based vs. capability-based Device Drivers Device Drivers  Hardware interrupts: mapped to IPC  I/O memory & I/O ports: mapped via flexpages L4 Microkernel 1.  ... 
doi:10.1145/224057.224075 fatcat:2sarf2wnenesteeah7io6mju54

On micro-kernel construction

J. Liedtke
1995 Proceedings of the fifteenth ACM symposium on Operating systems principles - SOSP '95  
Example -IBM Workplace OS / Mach ARM PowerPC MIPS Alpha IA32 Mach Microkernel Default Pager Device Support Bootstrap Name Service File Server Network Service Security Power Management  ...  Distributed policy and mechanism -ACL-based vs. capability-based Device Drivers Device Drivers  Hardware interrupts: mapped to IPC  I/O memory & I/O ports: mapped via flexpages L4 Microkernel 1.  ... 
doi:10.1145/224056.224075 dblp:conf/sosp/Liedtke95 fatcat:iu6hexz6kfd3zpcvyjqu7wvv5u

Security architecture for component-based operating systems

Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, Nayeem Islam
1998 Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications - EW 8  
The servers are trusted to enforce the specified policy.  ...  Components are trusted to define the interfaces that they export.  ... 
doi:10.1145/319195.319229 dblp:conf/sigopsE/JaegerLPPI98 fatcat:niuhkexppzbfnhubperedtugzq

Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing

P. Lokesh Kumar Reddy, B. Rama Bhupal Reddy, S. Rama Krishna
2012 International Journal of Computer Network and Information Security  
We report a new architecture for constructing a fiber-based network of quantum key distribution using optical wavelength division multiplexing in the fiber, and also using some wavelength protocols.  ...  The advantages are discussed in detail for demonstrating the experimental report in the way of feasibility for the proposed architecture.  ...  We propose a new architecture for implementing a fiber-based network of quantum key distribution using optical wavelength division multiplexing (WDM).  ... 
doi:10.5815/ijcnis.2012.06.06 fatcat:qgv3bdaodrhklke2xvl2juvoz4

Toward real microkernels

Jochen Liedtke
1996 Communications of the ACM  
However, the increased cache misses are caused by the Mach kernel, invoked for IPC, not by the higher modularity of the client/server architecture.  ...  Objectorientation and distribution will cause increased crossaddress-space interaction.  ...  Permission to make digital/hard copy of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage  ... 
doi:10.1145/234215.234473 fatcat:wmipp5n2ebhnpo7al2xbxw2iri

Towards A Blockchain-SDN Architecture for Secure and Trustworthy 5G Massive IoT Network

Behnam Dezfouli Akram Hakiri
2022 Zenodo  
That is, in our architecture distributed SDN controllers are aligned with distributed blockchain nodes to avoid unified IoT vulnerability attacks and emphasis geographical distribution of Fog computing  ...  Trusted transactions to be executed by a network of mutually distrusted nodes using consistent distributed agreements, without the need for a central arbitration authority.  ... 
doi:10.5281/zenodo.6451481 fatcat:k4nix6qifrgcxmbke4nxtydo5e

A critique of the GNU hurd multi-server operating system

Neal H. Walfield, Marcus Brinkmann
2007 ACM SIGOPS Operating Systems Review  
Then follows an evaluation of Mach, the microkernel on which the Hurd is built, emphasizing the design constraints which Mach imposes as well as a number of deficiencies its design presents for multi-server  ...  We then critique the architecture and assess it in terms of the user environment of today focusing on security.  ...  To allow translators to be restarted transparently and consistent with the distributed architecture, a passive translator setting can be saved in the node on which the translator is set.  ... 
doi:10.1145/1278901.1278907 fatcat:v6sjdqh3mzaorh4iayu3lrqdd4

Extending a capability based system into a network environment

R D Sansom, D P Julin, R F Rashid
1986 Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols - SIGCOMM '86  
The Mach operating system supports secure local communication within one node of a distributed system by providing protected communication capabilities called Ports.  ...  Such an extension offers many advantages: it supports higher-level protection mechanisms for the distributed system; it maintains the semantics of the local capability system in the distributed system  ...  These keys are distributed by a trusted, central Key Distribution Server using a variation of the Needham and Schroeder key distribution protocol [7] .  ... 
doi:10.1145/18172.18202 dblp:conf/sigcomm/SansomJR86 fatcat:6jixyh74brhztmgfa5znihdxsi

The duality of memory and communication in the implementation of a multiprocessor operating system

M. Young, A. Tevanian, R. Rashid, D. Golub, J. Eppinger
1987 ACM SIGOPS Operating Systems Review  
The relationship between memory and communication in Mach is examined as it relates to overall performance, applicability of Mach to new multiprocessor architectures, and the structure of application programs  ...  Mach is a multiprocessor operating system being implemented at Carnegie-Mellon University.  ...  Mach is being released externally to interested researchers. The second release of Mach was made in April, 1987. The next release is scheduled for the end of October, 1987.  ... 
doi:10.1145/37499.37507 fatcat:j7vt2rv2zzdmxjrc7yxhl6um5u

The duality of memory and communication in the implementation of a multiprocessor operating system

M. Young, A. Tevanian, R. Rashid, D. Golub, J. Eppinger
1987 Proceedings of the eleventh ACM Symposium on Operating systems principles - SOSP '87  
The relationship between memory and communication in Mach is examined as it relates to overall performance, applicability of Mach to new multiprocessor architectures, and the structure of application programs  ...  Mach is a multiprocessor operating system being implemented at Carnegie-Mellon University.  ...  Mach is being released externally to interested researchers. The second release of Mach was made in April, 1987. The next release is scheduled for the end of October, 1987.  ... 
doi:10.1145/41457.37507 dblp:conf/sosp/YoungTRGECBBB87 fatcat:7mblbcll75afdphha3jieb22ti
« Previous Showing results 1 — 15 out of 2,552 results