DOI:10.1145/504450.504477 - Corpus ID: 10027108
The persistent relevance of the local operating system to global applications
@inproceedings{Lepreau1996ThePR, title={The persistent relevance of the local operating system to global applications}, author={Jay Lepreau and Bryan Ford and Mike Hibler}, booktitle={EW 7}, year={1996}, url={https://api.semanticscholar.org/CorpusID:10027108} }
- Jay Lepreau, B. Ford, Mike Hibler
- Published in EW 7 9 September 1996
- Computer Science
This paper outlines the supporting arguments for these views and describes an OS design that supports secure encapsulation of the foreign processes that will be increasingly prevalent in tomorrow's distributed systems.
19 Citations
19 Citations
Nested Java processes: OS structure for mobile code
- Patrick TullmannJay Lepreau
- Computer Science
- 1998
Alta, a prototype Java-based system patterned on Fluke, a highly structured, hardware-based OS, is presented and its features appropriate to mobile code are reported on, including hierarchical resource management and flexible object sharing.
Sub-Identities : Toward Operating System Support for Distributed System Security
- P. SnowbergerD. Thain
- Computer Science
This work proposes sub-identities, a new model for protection domains in the operating system that gives users control over their own environment and also simplifies the interaction of distributed systems with local operating systems.
Ubiquitous Computing and the Need for a New Operating System Architecture
- M. GolmJ. Kleinöder
- Computer Science, Engineering
- 2001
JX is described, its own operating system architecture that has the desired properties, follows a microkernel approach, and structures the operating system as a set of components.
Operating System Support for Space Allocation in Grid Storage Systems
- D. Thain
- Computer Science, Engineering
- 2006
An abstract model of space allocation in the file system is described and three implementations of the model are explored: a user-level library, a recursive loopback filesystem, and a modified kernel filesystem.
Proceedings of the 5th Symposium on Operating Systems Design and Implementation Scale and Performance in the Denali Isolation Kernel
- Andrew WhitakerMarianne ShawS. Gribble
- Computer Science, Engineering
A detailed evaluation of Denali is presented, demonstrating that the overhead of virtu-alization is small, that the architectural choices are warranted, and that it can successfully scale to more than 10,000 virtual machines on commodity hardware.
Proceedings of the 5th symposium on Operating systems design and implementation
- D. CullerP. Druschel
- Computer Science
- 2002
The program presents important results in a wide range of areas, including distributed storage systems, robust software construction, OS kernel innovations, sensor networks, virtual machine monitors, large-scale network simulation, resource management architectures for Internet services, peer-to-peer systems, network analysis, and migration of execution environments.
Scale and performance in the Denali isolation kernel
- Andrew WhitakerMarianne ShawS. Gribble
- Computer Science, Engineering
- 2002
This paper describes the Denali isolation kernel, an operating system architecture that safely multiplexes a large number of untrusted Internet services on shared hardware. Denali's goal is to allow…
Implementation Tradeoffs in Storage Allocation for Grid Computing
- D. Thain
- Computer Science, Engineering
- 2006
This paper describes an abstract model of space allocation in the file system and explores three implementations of the model: a user-level library, a recursive loopback filesystem, and a modified kernel filesystem.
Linux Security Module Framework
- Chris WrightCrispin CowanS. Smalley
- Computer Science
- 2002
By providing Linux with a standard API for policy enforcement modules, the LSM project hopes to enable widespread deployment of security hardened systems.
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
- P. LoscoccoStephen Dale SmalleyP. A. MuckelbauerR. TaylorS. TurnerJ. Farrell
- Computer Science
- 2000
This paper identifies several secure operating system features which are lacking in mainstream operating systems, argues that these features are necessary to adequately protect general applica tion-space security mechanisms, and provides examples of how current security solutions are critically dependent on these features.
...
...
27 References
The case for persistent-connection HTTP
- J. Mogul
- Computer Science
- 1995
The results of log-driven simulations of several variants of the proposed modifications to HTTP demonstrate the value of persistent connections.
A Secure Environment for Untrusted Helper Applications
- I. GoldbergD. WagnerRandi ThomasE. Brewer
- Computer Science
- 1996
This work intercept and filter dangerous system calls via the Solaris process tracing facility, and builds a simple, clean, user-mode implementation of a secure environment for untrusted helper applications.
A caching model of operating system kernel functionality
- D. CheritonKenneth J. Duda
- Computer Science
- 1994
Experience with implementing the Cache Kernel and measurements of its performance on a multiprocessor suggest that the caching model can provide competitive performance with conventional monolithic operating systems, yet provides application-level control of system resources, better modularity, better scalability, smaller size and a basis for fault containment.
Microkernels meet recursive virtual machines
- B. FordMike HiblerJay LepreauPatrick TullmannGodmar BackS. Clawson
- Computer Science, Engineering
- 1996
A software-based virtualizable architecture called Fluke that allows recursive virtual machines (virtual machines running on other virtual machines) to be implemented efficiently by a microkernel running on generic hardware.
Java security: from HotJava to Netscape and beyond
- Drew DeanE. FeltenD. Wallach
- Computer ScienceProceedings 1996 IEEE Symposium on Security and…
- 1996
This work examines the Java language and both the HotJava and Netscape browsers which support it, and finds a significant number of flaws which compromise their security.
Modular real-time resource management in the Rialto operating system
- Michael B. JonesPaul J LeachRichard Draves
- Computer Science, EngineeringProceedings 5th Workshop on Hot Topics in…
- 1995
These investigations are being conducted in the context of the Rialto operating system-an object-based real-time kernel and programming environment currently being developed within Microsoft Research to allow multiple independent real- time programs to dynamically coexist and share resources on the same hardware platforms.
Operating systems support for busy Internet servers
- J. Mogul
- Computer Science, EngineeringProceedings 5th Workshop on Hot Topics in…
- 1995
The Internet has experienced exponential growth in the use of the World-Wide Web, and rapid growth in the use of other Internet services such as USENET news and electronic mail. These applications…
Object-Oriented Components for High-speed Network Programming
- D. SchmidtTimothy H. Harrison
- Computer Science, Engineering
- 1995
Performance results from benchmarking several network programming mechanisms on Ethernet and ATM networks illustrate that developers of bandwidth-intensive and delay-sensitive applications must evaluate their performance requirements and the efficiency of their communication infrastructure carefully before adopting a distributed object solution.
A Hierarchical Internet Object Cache
- A. ChankhunthodP. DanzigC. NeerdaelsM. SchwartzK. Worrell
- Computer Science
- 1996
The design and performance of a hierarchical proxy-cache designed to make Internet information systems scale better are discussed, and performance measurements indicate that hierarchy does not measurably increase access latency.
Using annotated interface definitions to optimize RPC
- B. FordMike HiblerJay Lepreau
- Computer Science
- 1995
The more efficient the underlying IPC transport mechanism is, the more important it is for the RPC system to support flexible presentation, in order to avoid unnecessary user-space overhead.
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers