Entry Mullender:1986:DCB from compj1980.bib
Last update: Sat Jan 6 02:03:49 MST 2018
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Mullender:1986:DCB,
author = "S. J. Mullender and A. S. Tanenbaum",
title = "The Design of a Capability-Based Distributed Operating
System",
journal = j-COMP-J,
volume = "29",
number = "4",
pages = "289--299",
month = aug,
year = "1986",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/29.4.289",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Dec 4 14:48:21 MST 2012",
bibsource = "Compendex database; Distributed/amoeba.bib;
Distributed/clusters.bib;
http://comjnl.oxfordjournals.org/content/29/4.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/;
Misc/IMMD_IV.bib",
URL = "http://comjnl.oxfordjournals.org/content/29/4/289.full.pdf+html;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/289.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/290.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/291.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/292.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/293.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/294.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/295.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/296.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/297.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/298.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_29/Issue_04/tiff/299.tif",
abstract = "Fifth-generation computer systems will use large
numbers of processors to achieve high performance. In
this paper a capability-based operating system designed
for this environment is discussed. Capability-based
operating systems have traditionally required large,
complex kernels to manage the use of capabilities. In
our proposal, capability management is done entirely by
user programs without giving up any of the protection
aspects normally associated with capabilities. The
basic idea is to use one-way functions and encryption
to protect sensitive information. Various aspects of
the proposed system are discussed.",
acknowledgement = ack-nhfb,
affiliation = "Cent for Mathematics \& Computer Science, Amsterdam,
Neth",
affiliationaddress = "Cent for Mathematics \& Computer Science,
Amsterdam, Neth",
classcodes = "C6130 (Data handling techniques); C6150J (Operating
systems)",
classification = "722; 723",
corpsource = "Centre for Math. and Comput. Sci., Amsterdam,
Netherlands",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "(computers); Amoeba Capabilities; capability
management; capability-based distributed operating
systems; capability-based operating system; computer
networks --- Protocols; computer operating systems;
computer systems, digital --- Distributed;
cryptography; data protection; distributed; distributed
processing; encryption; fifth generation systems;
fifth-generation computers; information; operating
system; operating systems; sensitive; user programs",
treatment = "P Practical",
}
Related entries
- achieve,
25(4)471
- aspect,
23(1)3,
23(1)5,
23(1)46,
27(3)193,
28(4)357,
32(3)262
- associated,
30(5)420,
32(5)413
- based, capability-,
27(1)3
- basic,
25(4)471,
31(6)570
- capability,
27(2)127,
29(1)1,
29(1)9,
29(3)269,
30(5)451,
31(3)201,
31(4)296,
31(5)386
- capability-based,
27(1)3
- complex,
23(2)98,
23(4)353,
24(3)263,
25(1)121,
28(4)366,
29(2)161,
29(2)182
- cryptography, 25-3-400c-400,
26(1)68,
28(3)343,
31(6)503,
32(1)13,
32(3)241,
32(5)470
- discussed,
31(4)296,
32(2)175
- done,
30(5)437,
32(5)461
- encryption,
28(3)343,
32(3)241
- environment,
23(1)13,
23(1)13,
23(2)115,
23(2)124,
27(1)37,
27(2)127,
28(2)148,
29(1)90,
29(2)151,
29(2)176,
29(3)201,
30(1)20,
30(2)157,
30(3)193,
31(2)165,
31(4)296,
31(4)353,
31(6)540,
32(1)55,
32(5)386,
32(6)541
- fifth,
29(3)246,
30(3)193
- function,
23(2)165,
23(3)286,
24(1)42,
25(3)379,
25(3)397,
25(4)448,
28(1)54,
29(1)9,
29(1)38,
29(3)277,
30(1)27,
31(1)17,
31(3)209,
31(3)229,
31(3)243,
31(6)510,
32(1)36,
32(1)93,
32(2)98,
32(2)122,
32(4)305,
32(5)461
- generation,
24(2)173,
25(2)176,
25(2)183,
25(3)316,
25(4)423,
26(2)97,
27(4)354,
28(1)17,
28(4)414,
28(4)433,
28(4)444,
29(2)151,
29(3)246,
29(3)282,
29(4)315,
29(6)486,
30(1)37,
30(1)63,
30(3)193,
30(3)282,
30(4)298,
30(6)551,
31(1)61,
32(3)281,
32(5)445,
32(5)470,
32(6)554
- have,
24(4)320,
31(3)243,
32(1)13,
32(2)142,
32(2)152,
32(2)162,
32(5)461
- high,
23(2)124,
23(2)153,
24(1)56,
25(1)153,
25(2)176,
25(2)264,
25(3)289,
26(1)52,
26(1)72,
26(2)124,
26(2)175,
26(3)228,
26(3)277,
26(4)344,
26(4)360,
26(4)366,
27(1)37,
27(1)83,
27(2)97,
27(2)151,
28(1)34,
28(3)231,
28(3)250,
28(4)391,
29(2)118,
29(3)229,
29(3)253,
29(4)340,
29(6)500,
29(6)506,
29(6)538,
30(2)128,
30(5)437,
30(6)487,
30(6)558,
31(2)99,
31(2)110,
31(3)220,
31(3)243,
32(1)36,
32(1)90,
32(2)127,
32(2)152,
32(2)162,
32(4)290,
32(4)297,
32(4)305,
32(4)312,
32(4)323,
32(4)341,
32(5)413
- idea,
32(2)122
- kernel,
24(1)17,
26(2)134,
27(1)3,
27(3)283,
29(2)109,
29(3)246,
30(2)183,
30(3)193,
30(4)316
- large,
25(3)327,
26(4)336,
27(2)135,
27(3)270,
28(3)231,
28(5)498,
30(4)295,
30(4)343,
30(4)362,
30(5)404,
32(2)162,
32(6)516
- number,
24(4)339,
25(1)48,
25(3)388,
25(4)471,
26(2)187,
26(3)224,
26(3)282,
27(4)375,
28(2)179,
29(1)90,
30(3)214,
30(3)249,
31(1)12,
31(1)76,
31(4)289,
32(4)374
- paper,
23(1)33,
24(1)95,
25(4)471,
26(2)109,
26(3)235,
27(3)288-2,
27(4)368-1,
28(1)1,
28(2)104-2,
28(4)446-1,
29(3)201,
29(3)277,
29(5)477-1,
31(5)457,
31(6)496,
32(2)98,
32(2)142,
32(2)152,
32(2)175,
32(5)422
- performance,
24(2)132,
24(4)343,
24(4)347,
24(4)384-2,
25(1)74,
25(2)169,
25(2)188,
25(2)193,
25(2)227,
25(3)347,
25(4)486,
26(1)93,
26(2)113,
27(1)27,
27(2)143,
27(2)165,
27(3)201,
27(3)238,
27(3)270,
28(2)142,
28(2)179,
28(3)231,
28(3)309,
28(3)319,
28(3)330,
28(4)409,
28(4)426,
28(5)501,
29(1)47,
29(2)118,
29(5)390,
29(5)396,
29(5)451,
30(4)289,
30(4)362,
30(6)519,
30(6)535,
31(1)12,
31(3)276,
31(4)304,
31(5)409,
31(5)437,
31(5)445,
31(6)490,
31(6)565,
32(1)16,
32(2)142,
32(2)152,
32(3)228,
32(3)252,
32(4)333,
32(5)437,
32(5)453
- processor,
23(2)147,
24(1)14,
24(1)62,
25(1)22,
25(4)423,
27(4)348,
28(1)29,
28(1)34,
28(2)148,
28(3)243,
28(4)357,
29(1)12,
29(5)390,
29(6)486,
30(2)119,
30(3)214,
30(5)386,
30(5)393,
30(5)404,
30(5)413,
30(5)420,
30(5)433,
30(5)437,
31(1)12,
31(6)517,
31(6)540,
31(6)545,
32(1)29,
32(1)91,
32(2)127,
32(2)142,
32(2)152,
32(2)175,
32(3)194,
32(3)276,
32(5)422,
32(5)437,
32(5)445,
32(6)571
- proposal,
23(4)380,
26(4)366,
32(4)305
- proposed,
25(4)471,
26(1)60,
27(4)368-1,
30(5)437,
32(2)162,
32(5)461
- protection,
24(2)118,
27(1)3,
27(1)47,
30(3)249,
31(1)25
- protocol,
25(1)22,
27(1)86,
31(4)289,
31(4)296,
31(5)474,
31(6)496,
32(3)252,
32(3)267,
32(4)362,
32(5)437
- required,
25(4)471,
31(4)289,
31(4)296,
32(1)13
- sensitive,
24(3)222,
27(3)238
- use,
23(2)107,
24(1)95,
25(2)218,
26(1)93,
26(3)235,
28(2)162,
28(3)203,
29(1)52,
29(2)167,
29(5)430,
30(1)80,
30(3)214,
30(4)362,
30(5)437,
30(5)451,
31(3)243,
31(4)289,
31(5)420,
32(2)122,
32(2)152,
32(4)333,
z(z)z
- Various,
28(2)112
- will,
32(1)13