Keedy / Rosenberg | Security and Persistence | Buch | 978-3-540-19646-4 | sack.de

Buch, Englisch, 394 Seiten, Paperback, Format (B × H): 170 mm x 242 mm, Gewicht: 709 g

Reihe: Workshops in Computing

Keedy / Rosenberg

Security and Persistence

Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8¿11 May 1990, Bremen, West Germany

Buch, Englisch, 394 Seiten, Paperback, Format (B × H): 170 mm x 242 mm, Gewicht: 709 g

Reihe: Workshops in Computing

ISBN: 978-3-540-19646-4
Verlag: Springer


During a short visit to Bremen in December 1989 John Rosenberg had several discussions with me about computer architecture. Although we had previously worked together for more than a decade in Australia we had not seen each other for over a year, following my move to Bremen in 1988. Meanwhile John was spending a year on study leave at the University of St. Andrews in Scotland with Professor Ron Morrison and his persistent programming research group. From our conversations it was quite clear that John was having a most fruitful time in St. Andrews and was gaining valuable new insights into the world of persistent programming. He was very keen to explore the significance of these insights for the MONADS Project, which we had been jOintly directing since the early 1980s. MONADS was not about persistent programming. In fact it had quite different origins, in the areas of software engineering and information protection. In an earlier stage of the project our ideas on these themes had led us into the world of computer architecture and even hardware deSign, in our attempts to provide an efficient base machine for our software ideas. The most important practical result of this phase of the project had been the development of the MONADS-PC, a mini­ computer which would be better compared with say a V tv< 11/750 than with a personal computer, despite its unfortunate name.
Keedy / Rosenberg Security and Persistence jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


I: Invited Presentations.- Capabilities and Security.- Persistent Languages and Architectures.- II: Principles and Models.- Dimensions of Addressing Schemes.- Protection in Persistent Object Systems.- A Model for Protection in Persistent Object-Oriented Systems.- III: Security.- Charging in a Secure Environment.- Algorithms for Data Encryption.- Capabilities and Encryption: The Ultimate Defense Against Security Attacks?.- IV: Architectures.- Implementing 128 Bit Persistent Addresses on 80x86 Processors.- Active Memory for Managing Persistent Objects.- A Layered Persistent Architecture for Napier88.- An Object-Oriented Approach to Support System Reliability and Security.- A Secure RISC-Based Architecture Supporting Data Persistence.- An Architecture Supporting Security and Persistent Object Storage.- V: Fault Tolerant Systems.- PUMA — A Capability-Based Architecture to Support Security and Fault Tolerance.- Stability in a Persistent Store Based on a Large Virtual Memory.- Stability in a Network of MONADS-PC Computers.- VI: Operating Systems.- VERITOS Distributed Operating System Project — An Overview.- Homogeneous Memory Management in the Context of the VERITOS Project.- Considerations of Persistence and Security in Choices, an Object-Oriented Operating System.- Combining Verified and Adaptive System Components Towards More Secure Computer Architectures.- Mechanisms for Security and Persistence in BirliX.- VII: Persistence and Databases.- Transactions in a Segmented Single Level Store Architecture.- The RelaX Transactional Object Management System.- Towards New Architectures for Distributed Autonomous Database Applications.- Persistence for Arbitrary C++ Data Structures.- Author Index.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.