A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
The reference monitor
1993
Proceedings on the 1992-1993 workshop on New security paradigms - NSPW '92-93
Figure 1 : 1 Figure 1: WindowsNT architecture [61
Figure 2 : 2 Figure 2: Mach architecture [71
Figure 3 : 3 Figure 3: Hurd architecture [41
Figure 4 : 4 Figure 4: Domain Separation Kernel Concept ...
For example, the BSD interface in Mach 2.5 is just a server in Mach 3.0. This architecture is displayed in figure 2 . The GNU Hurd is an example of a system built (building?) ...
doi:10.1145/283751.283847
dblp:conf/nspw/Rooker93a
fatcat:tc2vnf22zbcithsrri5pxro5b4
Mini track: 'peer-to-peer ecommerce systems and applications'
2004
37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the
Peer-to-Peer computing is characterized by an increasing decentralization and autonomy of components thus leading to a new paradigm of distributed computing requiring new approaches and patterns. ...
The third paper "Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries" by Mache, Ely, Gilbert, Gimba, Lopez and Wilkinson addresses a fundamental weakness ...
Peer-to-Peer computing is characterized by an increasing decentralization and autonomy of components thus leading to a new paradigm of distributed computing requiring new approaches and patterns. ...
doi:10.1109/hicss.2004.1265680
dblp:conf/hicss/AbererMO04
fatcat:vfwkk5c56jgzjayuhhmuvm7h4y
Security architectures revisited
2002
Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10
The knowledge in technologies needed to build secure platforms, or Security Architectures, has significantly matured over the recent years. ...
Classical security architectures Trusted Mach [2] (T-Mach) is a careful implementation of multi-level security. ...
Examples include DSSA (Digital Systems Security Architecture [5] ), Trusted Mach [2] , and BSA (BirliX Security Architecture [7] ). ...
doi:10.1145/1133373.1133376
dblp:conf/sigopsE/Hartig02
fatcat:rwp6m2qmmraclcf2nwjdltr2ja
Intelligent computing in engineering and architecture
2008
Advanced Engineering Informatics
Behzadan From SEEKing Knowledge to Making Connections: Challenges, Approaches and Architectures for Distributed Process Integration 500 William J. ...
Garrett Jr., Burcu Akinci, Scott Matthews, Chris Gordon, Hongjun Wang, Vipul Singhvi Understanding Situated Design Computing and Constructive Memory: Newton, Mach, Einstein and Quantum Mechanics 285 John ...
doi:10.1016/j.aei.2007.08.004
fatcat:wpn6f2bcfnfytmf5jschoa3ele
Hypersonic: Model Analysis and Checking in the Cloud
2014
International Conference on Software Technologies: Applications and Foundations
Objective: In this paper we investigate the conceptual and technical feasibility of a new software architecture for modeling tools, where certain advanced features are factored out of the client and moved ...
Using features implemented in the existing Model Analysis and Checking (MACH) tool, we create a RESTful Web service API offering model analysis facilities. We refer to it as the Hypersonic API. ...
associated tools (Chapter 2), propose a distributed architecture to satisfy these requirements (Chapter 3), and report on a proof-of-concept implementation (Chapter 4). ...
dblp:conf/staf/AcretoaieS14
fatcat:4rifo5rpmvgsvjpdtcvh445zme
On micro-kernel construction
1995
ACM SIGOPS Operating Systems Review
Example -IBM Workplace OS / Mach
ARM
PowerPC
MIPS
Alpha
IA32
Mach Microkernel
Default Pager
Device Support
Bootstrap
Name Service
File Server
Network Service
Security
Power Management ...
Distributed policy and mechanism -ACL-based vs. capability-based Device Drivers Device Drivers Hardware interrupts: mapped to IPC I/O memory & I/O ports: mapped via flexpages L4 Microkernel 1. ...
doi:10.1145/224057.224075
fatcat:2sarf2wnenesteeah7io6mju54
On micro-kernel construction
1995
Proceedings of the fifteenth ACM symposium on Operating systems principles - SOSP '95
Example -IBM Workplace OS / Mach
ARM
PowerPC
MIPS
Alpha
IA32
Mach Microkernel
Default Pager
Device Support
Bootstrap
Name Service
File Server
Network Service
Security
Power Management ...
Distributed policy and mechanism -ACL-based vs. capability-based Device Drivers Device Drivers Hardware interrupts: mapped to IPC I/O memory & I/O ports: mapped via flexpages L4 Microkernel 1. ...
doi:10.1145/224056.224075
dblp:conf/sosp/Liedtke95
fatcat:iu6hexz6kfd3zpcvyjqu7wvv5u
Security architecture for component-based operating systems
1998
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications - EW 8
The servers are trusted to enforce the specified policy. ...
Components are trusted to define the interfaces that they export. ...
doi:10.1145/319195.319229
dblp:conf/sigopsE/JaegerLPPI98
fatcat:niuhkexppzbfnhubperedtugzq
Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing
2012
International Journal of Computer Network and Information Security
We report a new architecture for constructing a fiber-based network of quantum key distribution using optical wavelength division multiplexing in the fiber, and also using some wavelength protocols. ...
The advantages are discussed in detail for demonstrating the experimental report in the way of feasibility for the proposed architecture. ...
We propose a new architecture for implementing a fiber-based network of quantum key distribution using optical wavelength division multiplexing (WDM). ...
doi:10.5815/ijcnis.2012.06.06
fatcat:qgv3bdaodrhklke2xvl2juvoz4
Toward real microkernels
1996
Communications of the ACM
However, the increased cache misses are caused by the Mach kernel, invoked for IPC, not by the higher modularity of the client/server architecture. ...
Objectorientation and distribution will cause increased crossaddress-space interaction. ...
Permission to make digital/hard copy of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage ...
doi:10.1145/234215.234473
fatcat:wmipp5n2ebhnpo7al2xbxw2iri
Towards A Blockchain-SDN Architecture for Secure and Trustworthy 5G Massive IoT Network
2022
Zenodo
That is, in our architecture distributed SDN controllers are aligned with distributed blockchain nodes to avoid unified IoT vulnerability attacks and emphasis geographical distribution of Fog computing ...
Trusted transactions to be executed by a network of mutually distrusted nodes using consistent distributed agreements, without the need for a central arbitration authority. ...
doi:10.5281/zenodo.6451481
fatcat:k4nix6qifrgcxmbke4nxtydo5e
A critique of the GNU hurd multi-server operating system
2007
ACM SIGOPS Operating Systems Review
Then follows an evaluation of Mach, the microkernel on which the Hurd is built, emphasizing the design constraints which Mach imposes as well as a number of deficiencies its design presents for multi-server ...
We then critique the architecture and assess it in terms of the user environment of today focusing on security. ...
To allow translators to be restarted transparently and consistent with the distributed architecture, a passive translator setting can be saved in the node on which the translator is set. ...
doi:10.1145/1278901.1278907
fatcat:v6sjdqh3mzaorh4iayu3lrqdd4
Extending a capability based system into a network environment
1986
Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols - SIGCOMM '86
The Mach operating system supports secure local communication within one node of a distributed system by providing protected communication capabilities called Ports. ...
Such an extension offers many advantages: it supports higher-level protection mechanisms for the distributed system; it maintains the semantics of the local capability system in the distributed system ...
These keys are distributed by a trusted, central Key Distribution Server using a variation of the Needham and Schroeder key distribution protocol [7] . ...
doi:10.1145/18172.18202
dblp:conf/sigcomm/SansomJR86
fatcat:6jixyh74brhztmgfa5znihdxsi
The duality of memory and communication in the implementation of a multiprocessor operating system
1987
ACM SIGOPS Operating Systems Review
The relationship between memory and communication in Mach is examined as it relates to overall performance, applicability of Mach to new multiprocessor architectures, and the structure of application programs ...
Mach is a multiprocessor operating system being implemented at Carnegie-Mellon University. ...
Mach is being released externally to interested researchers. The second release of Mach was made in April, 1987. The next release is scheduled for the end of October, 1987. ...
doi:10.1145/37499.37507
fatcat:j7vt2rv2zzdmxjrc7yxhl6um5u
The duality of memory and communication in the implementation of a multiprocessor operating system
1987
Proceedings of the eleventh ACM Symposium on Operating systems principles - SOSP '87
The relationship between memory and communication in Mach is examined as it relates to overall performance, applicability of Mach to new multiprocessor architectures, and the structure of application programs ...
Mach is a multiprocessor operating system being implemented at Carnegie-Mellon University. ...
Mach is being released externally to interested researchers. The second release of Mach was made in April, 1987. The next release is scheduled for the end of October, 1987. ...
doi:10.1145/41457.37507
dblp:conf/sosp/YoungTRGECBBB87
fatcat:7mblbcll75afdphha3jieb22ti
« Previous
Showing results 1 — 15 out of 2,552 results