E-Book, Englisch, 338 Seiten, eBook
Herbert / Spaerck Jones Computer Systems
Erscheinungsjahr 2006
ISBN: 978-0-387-21821-2
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Theory, Technology, and Applications
E-Book, Englisch, 338 Seiten, eBook
Reihe: Monographs in Computer Science
ISBN: 978-0-387-21821-2
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Introduction: Roger Needham.- On Access Control, Data Integration, and Their Languages.- Protocol Analysis, Composability and Computation.- Access Control in Distributed Systems.- Implementing Condition Variables with Semaphores.- Clumps, Clusters and Classification.- How to Implement Unnecessary Mutexes.- Bioware Languages.- The Economics of Open Systems.- From Universe to Global Internet.- Needham-Schroeder Goes to Court.- The Design of Reliable Operating Systems.- An Historical Connection between Time-Sharing and Virtual Circuits.- On Cross-Platform Security.- Distributed Computing Economics.- The Titan Influence.- Middleware? Muddleware!.- Grand Challenges for Computing Research.- Sentient Computing.- Cyber Security in Open Systems.- Software Components: Only the Giants Survive.- Security Protocols: Who Knows What Exactly?.- Volume Rendering by Ray-Casting in Shear-Image Order.- A Conceptual Authorization Model for Web Services.- The Trouble with Standards.- Novelty in the Nemesis Operating System.- A Technology Transfer Retrospective.- An Optical LAN.- What’s in a Name?.- The Cryptographic Role of the Cleaning Lady.- Real Time in a Real Operating System.- Zen and the Art of Research Management.- The Descent of BAN.- Brief Encounters.- Retrieval System Models: What’s New?.- Slammer: An Urgent Wake-Up Call.- Caching Trust Rather Than Content.- Least Privilege and More.- Using Sharing to Simplify System Management.- An RSA-Related Number-Theoretic Surprise.- Application-Private Networks.- Using the CORAL System to Discover Attacks on Security Protocols.- On the Role of Binding and Rate Adaptation in Packet Networks.- Technologies for Portable Computing: Outlook and Limitations.- Multiple Alternative Voting.- The Semiotics of Umbrellas.- Computers for SpecializedApplication Areas.