Computer Systems Theory, Technology, and Applications /

Computer Systems: Theory, Technology, and Applications A Tribute to Roger Needham Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Herbert, Andrew (Επιμελητής έκδοσης), Jones, Karen Spärck (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: New York, NY : Springer New York, 2004.
Σειρά:Monographs in Computer Science,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Introduction: Roger Needham
  • On Access Control, Data Integration, and Their Languages
  • Protocol Analysis, Composability and Computation
  • Access Control in Distributed Systems
  • Implementing Condition Variables with Semaphores
  • Clumps, Clusters and Classification
  • How to Implement Unnecessary Mutexes
  • Bioware Languages
  • The Economics of Open Systems
  • From Universe to Global Internet
  • Needham-Schroeder Goes to Court
  • The Design of Reliable Operating Systems
  • An Historical Connection between Time-Sharing and Virtual Circuits
  • On Cross-Platform Security
  • Distributed Computing Economics
  • The Titan Influence
  • Middleware? Muddleware!
  • Grand Challenges for Computing Research
  • Sentient Computing
  • Cyber Security in Open Systems
  • Software Components: Only the Giants Survive
  • Security Protocols: Who Knows What Exactly?
  • Volume Rendering by Ray-Casting in Shear-Image Order
  • A Conceptual Authorization Model for Web Services
  • The Trouble with Standards
  • Novelty in the Nemesis Operating System
  • A Technology Transfer Retrospective
  • An Optical LAN
  • What’s in a Name?
  • The Cryptographic Role of the Cleaning Lady
  • Real Time in a Real Operating System
  • Zen and the Art of Research Management
  • The Descent of BAN
  • Brief Encounters
  • Retrieval System Models: What’s New?
  • Slammer: An Urgent Wake-Up Call
  • Caching Trust Rather Than Content
  • Least Privilege and More
  • Using Sharing to Simplify System Management
  • An RSA-Related Number-Theoretic Surprise
  • Application-Private Networks
  • Using the CORAL System to Discover Attacks on Security Protocols
  • On the Role of Binding and Rate Adaptation in Packet Networks
  • Technologies for Portable Computing: Outlook and Limitations
  • Multiple Alternative Voting
  • The Semiotics of Umbrellas
  • Computers for Specialized Application Areas.