Summary
Computer Systems form the core of computing as their combinations of hardware and software components function together to help program developers and end users achieve goals of managing and access information in all its forms. Roger Needham, in a distinguished career at Cambridge University and Microsoft Research, was a leader of computer systems research and noted innovator in the crucial area of systems security.
Computer Systems: Theory, Technology and Applications presents a comprehensive edited survey of all aspects of the subject, with original contributions by more than 40 international leaders in the field. The book, while honouring Needham’s important contributions, assembles a collection of articles showing the state of the art in systems - from formal calculi to mobile devices, from operating systems to application tools, and from security techniques to design policies.
Among the topics addressed:
- Access control, data integration, and their languages
- Clumps, clusters and classification
- The economics of open systems
- The Needham-Schroeder authentication protocol
- Sentient computing
- A technology transfer retrospective
- Real-time in a real operating system
- Application-private networks
- Technologies for portable computing
- An authorization model for web services
- Challenges for computing research
- Protocol analysis, composability and computation
This accessible monograph is an ideal overview of theoretical and empirical evolution in computer systems. It will serve as an invaluable resource for professionals, researchers, libraries, and students who are interested in broadening their knowledge of the entire field.
Contents
Preface
Roger Needham: 50 + 5 Meeting Programme
Contributors
Introduction: Roger Needham
    
Rick Rashid
- 
    On Access Control, Data Integration, and Their Languages 
 Martín Abadi
- 
    Protocol Analysis, Composability and Computation 
 Ross Anderson, Michael Bond
- 
    Access Control in Distributed Systems 
 Jean Bacon, Ken Moody
- 
    Implementing Condition Variables with Semaphores 
 Andrew D. Birrell
- 
    Clumps, Clusters and Classification 
 Christopher M. Bishop
- 
    How to Implement Unnecessary Mutexes 
 Mike Burrows
- 
    Bioware Languages 
 Luca Cardelli
- 
    The Economics of Open Systems 
 David D. Clark
- 
    From Universe to Global Internet 
 Jon Crowcroft
- 
    Needham-Schroeder Goes to Court 
 Dorothy E. Denning
- 
    The Design of Reliable Operating Systems 
 Peter Denning
- 
    An Historical Connection between Time-Sharing and Virtual Circuits 
 Sandy Fraser
- 
    On Cross-Platform Security 
 Li Gong
- 
    Distributed Computing Economics 
 Jim Gray
- 
    The Titan Influence 
 David Hartley
- 
    Middleware? Muddleware? 
 Andrew Herbert
- 
    Grand Challenges for Computing Research 
 Tony Hoare
- 
    Sentient Computing 
 Andy Hopper
- 
    Cyber Security in Open Systems 
 Anita Jones
- 
    Software Components: Only the Giants Survive 
 Butler W. Lampson
- 
    Security Protocols: Who Knows What Exactly? 
 Peter Landrock
- 
    Volume Rendering by Ray-Casting in Shear-Image Order 
 Hugh C. Lauer, Yin Wu, Vishal Bhatia, Larry Seiler
- 
    A Conceptual Authorization Model for Web Services 
 Paul J. Leach, Chris Kaler, Blair Dillaway, Praerit Garg, Brian LaMacchia, Butler Lampson, John Manferdelli, Rick Rashid, John Shewchuk, Dan Simon, Richard Ward
- 
    The Trouble with Standards 
 E. Stewart Lee
- 
    Novelty in the Nemesis Operating System 
 Ian Leslie
- 
    A Technology Transfer Retrospective 
 Roy Levin
- 
    An Optical LAN 
 Derek McAuley
- 
    What’s in a Name? 
 Robin Milner
- 
    The Cryptographic Role of the Cleaning Lady 
 Bob Morris
- 
    Real Time in a Real Operating System 
 Sape J. Mullender, Pierre G. Jansen
- 
    Zen and the Art of Research Management 
 John Naughton, Robert W. Taylor
- 
    The Descent of BAN 
 Lawrence C. Paulson
- 
    Brief Encounters 
 Brian Randell
- 
    Retrieval System Models: What’s New? 
 Stephen Robertson, Karen Spärck Jones
- 
    Slammer: An Urgent Wake-Up Call 
 Jerome H. Saltzer
- 
    Caching Trust Rather Than Content 
 M. Satyanarayanan
- 
    Least Privilege and More 
 Fred B. Schneider
- 
    Using Sharing to Simplify System Management 
 Michael D. Schroeder
- 
    An RSA-Related Number-Theoretic Surprise 
 Gustavus J. Simmons
- 
    Application-Private Networks 
 Jonathan M. Smith
- 
    Using the CORAL System to Discover Attacks on Security Protocols 
 Graham Steel, Alan Bundy, Ewen Denney
- 
    On the Role of Binding and Rate Adaptation in Packet Networks 
 David Tennenhouse
- 
    Technologies for Portable Computing 
 Chuck Thacker
- 
    Multiple Alternative Voting 
 David Wheeler
- 
    The Semiotics of Umbrellas 
 John Wilkes
- 
    Computers for Specialized Application Areas 
 Maurice Wilkes
Computer Security?
    
Roger Needham
Roger Needham: Publications
    
Karen Spärck Jones