ThesaHelp: references g-h
Topic: security by capabilities
Topic: security leaks and weaknesses
Topic: authentication
Topic: encryption
Topic: functional programming
Topic: concurrency
Topic: naming authority
Topic: hardware for interprocess communication
Topic: broadcasting information
Topic: distributed system security
Topic: communication protocols
Topic: synchronized processing
Topic: message queues for communication
Topic: asynchronous processing
Topic: unique numeric names as surrogates
Topic: random number generation
Topic: software maintenance by patching
Topic: Thesa compiler and loader
Topic: translation of data
Topic: data caching
Topic: virtual memory
Group: expression evaluation
| |
Reference
Gifford, D.K., Rashid, R.F., Spector, A.Z.,
"Distributed Systems", course at Stanford University, Palo Alto, California, Magalia, California, Western Institute in Computer Science, July 29 - August 2, 1985.
Google
Quotations
gifford ;;Quote: hybrid access control gives a short-term capability; e.g., channel id while a file is opened
| gifford ;;Quote: secure systems need to confine data to a domain; problems if share resource, e.g., channel of 'disk hits' allows 70baud
| gifford ;;Quote: implement secrecy/authentication policies with key-or (one of several) and key-and (all keys)
| gifford ;;Quote: for a language, define a functional subset without side effects; can be executed concurrently
| rashid ;;Quote: a Xerox subsidiary sells addresses for ethernet
| rashid ;;Quote: broadcast is seldom used in ethernet because everyone must process it; too slow
| rashid ;;Quote: Arpanet needed secure, trusted gateways in locked rooms
| rashid ;;Quote: can't say bye by exchanging messages; instead timeout or ping throughout conversation
| rashid ;;Quote: use asynchronous communication because can be as efficient as synchronous and more flexible
| rashid ;;Quote: in a distributed environment need unique, permanent ids (128 bits) for all data
| rashid ;;Quote: update a distributed program by new functions with old and new interfaces
| rashid ;;Quote: MIT's Common system for data type conversion
| rashid ;;Quote: Apollo's AEGIS single level store uses 64-bit object id plus 32-bit offset for every byte on network; rapid remote access
| rashid ;;Quote: copy on write: don't allocate backing store for a copied page until write to it; lazy evaluation
|
Related Topics
ThesaHelp: references g-h (299 items)
Topic: security by capabilities (65 items)
Topic: security leaks and weaknesses (56 items)
Topic: authentication (87 items)
Topic: encryption (43 items)
Topic: functional programming (43 items)
Topic: concurrency (33 items)
Topic: naming authority (7 items)
Topic: hardware for interprocess communication (31 items)
Topic: broadcasting information (18 items)
Topic: distributed system security (16 items)
Topic: communication protocols (61 items)
Topic: synchronized processing (35 items)
Topic: message queues for communication (36 items)
Topic: asynchronous processing (30 items)
Topic: unique numeric names as surrogates (67 items)
Topic: random number generation (29 items)
Topic: software maintenance by patching (26 items)
Topic: Thesa compiler and loader (23 items)
Topic: translation of data (26 items)
Topic: data caching (28 items)
Topic: virtual memory (32 items)
Group: expression evaluation (5 topics, 96 quotes)
|