|
![]() |
|||
|
||||
OverviewThis volume presents the proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, which was held in Bremen, West Germany, in May 1990. The papers provide state-of-the-art details of current research into topics including persistent architectures, security, capability-based addressing and operating systems. Persistent systems are systems which support the creation and manipulation of objects in a uniform manner, regardless of how long they persist. This is in direct contrast to conventional systems where temporary and permanent objects are handled by separate mechanisms. The workshop brought together researchers in the areas of persistence and security to discuss issues related to architectural support for security and, as a result, capability-based protection schemes receive considerable attention. The implications of these architectures for software, in particular operating systems and databases, is the topic of several of the papers. Full Product DetailsAuthor: John Rosenberg , J.Leslie KeedyPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: Softcover reprint of the original 1st ed. 1990 Dimensions: Width: 17.00cm , Height: 2.20cm , Length: 24.20cm Weight: 0.713kg ISBN: 9783540196464ISBN 10: 3540196463 Pages: 394 Publication Date: 19 November 1990 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsI: Invited Presentations.- Capabilities and Security.- Persistent Languages and Architectures.- II: Principles and Models.- Dimensions of Addressing Schemes.- Protection in Persistent Object Systems.- A Model for Protection in Persistent Object-Oriented Systems.- III: Security.- Charging in a Secure Environment.- Algorithms for Data Encryption.- Capabilities and Encryption: The Ultimate Defense Against Security Attacks?.- IV: Architectures.- Implementing 128 Bit Persistent Addresses on 80x86 Processors.- Active Memory for Managing Persistent Objects.- A Layered Persistent Architecture for Napier88.- An Object-Oriented Approach to Support System Reliability and Security.- A Secure RISC-Based Architecture Supporting Data Persistence.- An Architecture Supporting Security and Persistent Object Storage.- V: Fault Tolerant Systems.- PUMA - A Capability-Based Architecture to Support Security and Fault Tolerance.- Stability in a Persistent Store Based on a Large Virtual Memory.- Stability in a Network of MONADS-PC Computers.- VI: Operating Systems.- VERITOS Distributed Operating System Project - An Overview.- Homogeneous Memory Management in the Context of the VERITOS Project.- Considerations of Persistence and Security in Choices, an Object-Oriented Operating System.- Combining Verified and Adaptive System Components Towards More Secure Computer Architectures.- Mechanisms for Security and Persistence in BirliX.- VII: Persistence and Databases.- Transactions in a Segmented Single Level Store Architecture.- The RelaX Transactional Object Management System.- Towards New Architectures for Distributed Autonomous Database Applications.- Persistence for Arbitrary C++ Data Structures.- Author Index.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |