Bültmann & Gerriets
Computer Systems
Theory, Technology, and Applications
von Andrew James Herbert, Karen I. B. Spaerck Jones
Verlag: Springer New York
Reihe: Monographs in Computer Science
E-Book / PDF
Kopierschutz: PDF mit Wasserzeichen

Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-0-387-21821-2
Auflage: 2004
Erschienen am 07.05.2006
Sprache: Englisch
Umfang: 338 Seiten

Preis: 53,49 €

53,49 €
merken
Inhaltsverzeichnis
Klappentext

Contents
Preface
Roger Needham: 50 + 5 Meeting Programme
Contributors
Introduction: Roger Needham
Rick Rashid 1 On Access Control, Data Integration, and Their Languages
Martín Abadi 2 Protocol Analysis, Composability and Computation
Ross Anderson, Michael Bond 3 Access Control in Distributed Systems
Jean Bacon, Ken Moody 4 Implementing Condition Variables with Semaphores
Andrew D. Birrell 5 Clumps, Clusters and Classification
Christopher M. Bishop 6 How to Implement Unnecessary Mutexes
Mike Burrows 7 Bioware Languages
Luca Cardelli 8 The Economics of Open Systems
David D. Clark 9 From Universe to Global Internet
Jon Crowcroft 10 Needham-Schroeder Goes to Court
Dorothy E. Denning 11 The Design of Reliable Operating Systems
Peter Denning 12 An Historical Connection between Time-Sharing and Virtual Circuits
Sandy Fraser 13 On Cross-Platform Security
Li Gong 14 Distributed Computing Economics
Jim Gray 15 The Titan Influence
David Hartley 16 Middleware? Muddleware?
Andrew Herbert 17 Grand Challenges for Computing Research
Tony Hoare 18 Sentient Computing
Andy Hopper 19 Cyber Security in Open Systems
Anita Jones 20 Software Components: Only the Giants Survive
Butler W. Lampson 21 Security Protocols: Who Knows What Exactly?
Peter Landrock 22 Volume Rendering by Ray-Casting in Shear-Image Order
Hugh C. Lauer, Yin Wu, Vishal Bhatia, Larry Seiler 23 A Conceptual Authorization Model for Web Services
Paul J. Leach, Chris Kaler, Blair Dillaway, Praerit Garg, Brian LaMacchia, Butler Lampson, John Manferdelli, Rick Rashid, John Shewchuk, Dan Simon, Richard Ward 24 The Trouble with Standards
E. Stewart Lee 25 Novelty in the Nemesis Operating System
Ian Leslie 26 A Technology Transfer Retrospective
Roy Levin 27 An Optical LAN
Derek McAuley 28 What's in a Name?
Robin Milner 29 The Cryptographic Role of the Cleaning Lady
Bob Morris 30 Real Time in a Real Operating System
Sape J. Mullender, Pierre G. Jansen 31 Zen and the Art of Research Management
John Naughton, Robert W. Taylor 32 The Descent of BAN
Lawrence C. Paulson 33 Brief Encounters
Brian Randell 34 Retrieval System Models: What's New?
Stephen Robertson, Karen Spärck Jones 35 Slammer: An Urgent Wake-Up Call
Jerome H. Saltzer 36 Caching Trust Rather Than Content
M. Satyanarayanan 37 Least Privilege and More
Fred B. Schneider 38 Using Sharing to Simplify System Management
Michael D. Schroeder 39 An RSA-Related Number-Theoretic Surprise
Gustavus J. Simmons 40 Application-Private Networks
Jonathan M. Smith 41 Using the CORAL System to Discover Attacks on Security Protocols
Graham Steel, Alan Bundy, Ewen Denney 42 On the Role of Binding and Rate Adaptation in Packet Networks
David Tennenhouse 43 Technologies for Portable Computing
Chuck Thacker 44 Multiple Alternative Voting
David Wheeler 45 The Semiotics of Umbrellas
John Wilkes 46 Computers for Specialized Application Areas
Maurice Wilkes 47 Computer Security?
Roger Needham
Roger Needham: Publications
Karen Spärck Jones



An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research.

From operating systems to distributed computing, many of the world's leading researchers provide insight into the latest concepts and theoretical insights--many of which are based upon Needham's pioneering research work.

A critical collection of edited-survey research papers spanning the entire range of Roger Needham's distinguished scientific career, from operating systems to distributed computing and security. Many of the world's leading researchers survey their topics' latest developments and acknowledge the theoretical foundations of Needham's work.

Introduction to book written by Rick Rashid, Director of Microsoft Research Worldwide.


weitere Titel der Reihe