Computer Systems Theory, Technology, and Applications /
Computer Systems: Theory, Technology, and Applications A Tribute to Roger Needham Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
New York, NY :
Springer New York,
2004.
|
Σειρά: | Monographs in Computer Science,
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Introduction: Roger Needham
- On Access Control, Data Integration, and Their Languages
- Protocol Analysis, Composability and Computation
- Access Control in Distributed Systems
- Implementing Condition Variables with Semaphores
- Clumps, Clusters and Classification
- How to Implement Unnecessary Mutexes
- Bioware Languages
- The Economics of Open Systems
- From Universe to Global Internet
- Needham-Schroeder Goes to Court
- The Design of Reliable Operating Systems
- An Historical Connection between Time-Sharing and Virtual Circuits
- On Cross-Platform Security
- Distributed Computing Economics
- The Titan Influence
- Middleware? Muddleware!
- Grand Challenges for Computing Research
- Sentient Computing
- Cyber Security in Open Systems
- Software Components: Only the Giants Survive
- Security Protocols: Who Knows What Exactly?
- Volume Rendering by Ray-Casting in Shear-Image Order
- A Conceptual Authorization Model for Web Services
- The Trouble with Standards
- Novelty in the Nemesis Operating System
- A Technology Transfer Retrospective
- An Optical LAN
- What’s in a Name?
- The Cryptographic Role of the Cleaning Lady
- Real Time in a Real Operating System
- Zen and the Art of Research Management
- The Descent of BAN
- Brief Encounters
- Retrieval System Models: What’s New?
- Slammer: An Urgent Wake-Up Call
- Caching Trust Rather Than Content
- Least Privilege and More
- Using Sharing to Simplify System Management
- An RSA-Related Number-Theoretic Surprise
- Application-Private Networks
- Using the CORAL System to Discover Attacks on Security Protocols
- On the Role of Binding and Rate Adaptation in Packet Networks
- Technologies for Portable Computing: Outlook and Limitations
- Multiple Alternative Voting
- The Semiotics of Umbrellas
- Computers for Specialized Application Areas.