Computer Systems Theory, Technology, and Applications

Computer Systems: Theory, Technology, and Applications A Tribute to Roger Needham Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in a...

Full description

Bibliographic Details
Other Authors: Herbert, Andrew James (Editor), Spaerck Jones, Karen I.B. (Editor)
Format: eBook
Language:English
Published: New York, NY Springer New York 2004, 2004
Edition:1st ed. 2004
Series:Monographs in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 05005nmm a2200421 u 4500
001 EB000614884
003 EBX01000000000000000467966
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9780387218212 
100 1 |a Herbert, Andrew James  |e [editor] 
245 0 0 |a Computer Systems  |h Elektronische Ressource  |b Theory, Technology, and Applications  |c edited by Andrew James Herbert, Karen I.B. Spaerck Jones 
250 |a 1st ed. 2004 
260 |a New York, NY  |b Springer New York  |c 2004, 2004 
300 |a XVII, 338 p. 67 illus  |b online resource 
505 0 |a Introduction: Roger Needham -- On Access Control, Data Integration, and Their Languages -- Protocol Analysis, Composability and Computation -- Access Control in Distributed Systems -- Implementing Condition Variables with Semaphores -- Clumps, Clusters and Classification -- How to Implement Unnecessary Mutexes -- Bioware Languages -- The Economics of Open Systems -- From Universe to Global Internet -- Needham-Schroeder Goes to Court -- The Design of Reliable Operating Systems -- An Historical Connection between Time-Sharing and Virtual Circuits -- On Cross-Platform Security -- Distributed Computing Economics -- The Titan Influence -- Middleware? Muddleware! -- Grand Challenges for Computing Research -- Sentient Computing -- Cyber Security in Open Systems -- Software Components: Only the Giants Survive -- Security Protocols: Who Knows What Exactly? -- Volume Rendering by Ray-Casting in Shear-Image Order -- A Conceptual Authorization Model for Web Services -- The Trouble with Standards -- Novelty in the Nemesis Operating System -- A Technology Transfer Retrospective -- An Optical LAN -- What’s in a Name? -- The Cryptographic Role of the Cleaning Lady -- Real Time in a Real Operating System -- Zen and the Art of Research Management -- The Descent of BAN -- Brief Encounters -- Retrieval System Models: What’s New? -- Slammer: An Urgent Wake-Up Call -- Caching Trust Rather Than Content -- Least Privilege and More -- Using Sharing to Simplify System Management -- An RSA-Related Number-Theoretic Surprise -- Application-Private Networks -- Using the CORAL System to Discover Attacks on Security Protocols -- On the Role of Binding and Rate Adaptation in Packet Networks -- Technologies for Portable Computing: Outlook and Limitations -- Multiple Alternative Voting -- The Semiotics of Umbrellas -- Computers for SpecializedApplication Areas 
653 |a Computer Communication Networks 
653 |a Compilers (Computer programs) 
653 |a Compilers and Interpreters 
653 |a Operating Systems 
653 |a Software engineering 
653 |a Computer science 
653 |a Operating systems (Computers) 
653 |a Software Engineering 
653 |a Computer networks  
653 |a Computer Engineering and Networks 
653 |a Computer engineering 
653 |a Theory of Computation 
700 1 |a Spaerck Jones, Karen I.B.  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Monographs in Computer Science 
028 5 0 |a 10.1007/b97622 
856 4 0 |u https://doi.org/10.1007/b97622?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6 
082 0 |a 621.39 
520 |a Computer Systems: Theory, Technology, and Applications A Tribute to Roger Needham Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in all its forms. Roger Needham, in a distinguished career at Cambridge University and Microsoft Research, was a pioneer of computer systems research and a noted innovator in the crucial area of system security. Computer Systems: Theory, Technology, and Applications presents a comprehensive edited survey of all aspects of the subject, with original contributions by more than 40 international leaders in the field. The book assembles a collection of short articles showing the state-of-the-art in systems, from formal calculi to mobile devices, from operating systems to distributed computing and security—while also honoring Needham’s important contributions. Among the topics addressed: Access control, data integration, and their languages Clumps, clusters, and classification The economics of open systems The Needham – Schroeder authentication protocol Sentient computing A technology transfer retrospective Real time in a real operating system Application-private networks Technologies for portable computing An authorization model for web services Challenges for computing research Protocol analysis, composability, and computation This accessible monograph is an ideal overview of theoretical and empirical evolution in computer systems. It will serve as an invaluable resource for professionals, researchers, libraries, and students who are interestedin broadening their knowledge of the entire field