Security and persistence : proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, 8-11 May 1990, Bremen, West Germany

書誌事項

Security and persistence : proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, 8-11 May 1990, Bremen, West Germany

John Rosenberg and J. Leslie Keedy, eds

(Workshops in computing)

Springer-Verlag, c1990

  • : Berlin
  • : New York

タイトル別名

Security and persistence, Bremen 1990

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

注記

Cover title: Security and persistence, Bremen 1990

"Published in collaboration with the British Computer Society."

Includes bibliographical references and index

内容説明・目次

内容説明

During a short visit to Bremen in December 1989 John Rosenberg had several discussions with me about computer architecture. Although we had previously worked together for more than a decade in Australia we had not seen each other for over a year, following my move to Bremen in 1988. Meanwhile John was spending a year on study leave at the University of St. Andrews in Scotland with Professor Ron Morrison and his persistent programming research group. From our conversations it was quite clear that John was having a most fruitful time in St. Andrews and was gaining valuable new insights into the world of persistent programming. He was very keen to explore the significance of these insights for the MONADS Project, which we had been jOintly directing since the early 1980s. MONADS was not about persistent programming. In fact it had quite different origins, in the areas of software engineering and information protection. In an earlier stage of the project our ideas on these themes had led us into the world of computer architecture and even hardware deSign, in our attempts to provide an efficient base machine for our software ideas. The most important practical result of this phase of the project had been the development of the MONADS-PC, a mini computer which would be better compared with say a V tv< 11/750 than with a personal computer, despite its unfortunate name.

目次

I: Invited Presentations.- Capabilities and Security.- Persistent Languages and Architectures.- II: Principles and Models.- Dimensions of Addressing Schemes.- Protection in Persistent Object Systems.- A Model for Protection in Persistent Object-Oriented Systems.- III: Security.- Charging in a Secure Environment.- Algorithms for Data Encryption.- Capabilities and Encryption: The Ultimate Defense Against Security Attacks?.- IV: Architectures.- Implementing 128 Bit Persistent Addresses on 80x86 Processors.- Active Memory for Managing Persistent Objects.- A Layered Persistent Architecture for Napier88.- An Object-Oriented Approach to Support System Reliability and Security.- A Secure RISC-Based Architecture Supporting Data Persistence.- An Architecture Supporting Security and Persistent Object Storage.- V: Fault Tolerant Systems.- PUMA - A Capability-Based Architecture to Support Security and Fault Tolerance.- Stability in a Persistent Store Based on a Large Virtual Memory.- Stability in a Network of MONADS-PC Computers.- VI: Operating Systems.- VERITOS Distributed Operating System Project - An Overview.- Homogeneous Memory Management in the Context of the VERITOS Project.- Considerations of Persistence and Security in Choices, an Object-Oriented Operating System.- Combining Verified and Adaptive System Components Towards More Secure Computer Architectures.- Mechanisms for Security and Persistence in BirliX.- VII: Persistence and Databases.- Transactions in a Segmented Single Level Store Architecture.- The RelaX Transactional Object Management System.- Towards New Architectures for Distributed Autonomous Database Applications.- Persistence for Arbitrary C++ Data Structures.- Author Index.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

ページトップへ