Summary
Computer Systems form the core of computing as their combinations of hardware and software components function together to help program developers and end users achieve goals of managing and access information in all its forms. Roger Needham, in a distinguished career at Cambridge University and Microsoft Research, was a leader of computer systems research and noted innovator in the crucial area of systems security.
Computer Systems: Theory, Technology and Applications presents a comprehensive edited survey of all aspects of the subject, with original contributions by more than 40 international leaders in the field. The book, while honouring Needham’s important contributions, assembles a collection of articles showing the state of the art in systems - from formal calculi to mobile devices, from operating systems to application tools, and from security techniques to design policies.
Among the topics addressed:
- Access control, data integration, and their languages
- Clumps, clusters and classification
- The economics of open systems
- The Needham-Schroeder authentication protocol
- Sentient computing
- A technology transfer retrospective
- Real-time in a real operating system
- Application-private networks
- Technologies for portable computing
- An authorization model for web services
- Challenges for computing research
- Protocol analysis, composability and computation
This accessible monograph is an ideal overview of theoretical and empirical evolution in computer systems. It will serve as an invaluable resource for professionals, researchers, libraries, and students who are interested in broadening their knowledge of the entire field.
Contents
Preface
Roger Needham: 50 + 5 Meeting Programme
Contributors
Introduction: Roger Needham
Rick Rashid
-
On Access Control, Data Integration, and Their Languages
Martín Abadi -
Protocol Analysis, Composability and Computation
Ross Anderson, Michael Bond -
Access Control in Distributed Systems
Jean Bacon, Ken Moody -
Implementing Condition Variables with Semaphores
Andrew D. Birrell -
Clumps, Clusters and Classification
Christopher M. Bishop -
How to Implement Unnecessary Mutexes
Mike Burrows -
Bioware Languages
Luca Cardelli -
The Economics of Open Systems
David D. Clark -
From Universe to Global Internet
Jon Crowcroft -
Needham-Schroeder Goes to Court
Dorothy E. Denning -
The Design of Reliable Operating Systems
Peter Denning -
An Historical Connection between Time-Sharing and Virtual Circuits
Sandy Fraser -
On Cross-Platform Security
Li Gong -
Distributed Computing Economics
Jim Gray -
The Titan Influence
David Hartley -
Middleware? Muddleware?
Andrew Herbert -
Grand Challenges for Computing Research
Tony Hoare -
Sentient Computing
Andy Hopper -
Cyber Security in Open Systems
Anita Jones -
Software Components: Only the Giants Survive
Butler W. Lampson -
Security Protocols: Who Knows What Exactly?
Peter Landrock -
Volume Rendering by Ray-Casting in Shear-Image Order
Hugh C. Lauer, Yin Wu, Vishal Bhatia, Larry Seiler -
A Conceptual Authorization Model for Web Services
Paul J. Leach, Chris Kaler, Blair Dillaway, Praerit Garg, Brian LaMacchia, Butler Lampson, John Manferdelli, Rick Rashid, John Shewchuk, Dan Simon, Richard Ward -
The Trouble with Standards
E. Stewart Lee -
Novelty in the Nemesis Operating System
Ian Leslie -
A Technology Transfer Retrospective
Roy Levin -
An Optical LAN
Derek McAuley -
What’s in a Name?
Robin Milner -
The Cryptographic Role of the Cleaning Lady
Bob Morris -
Real Time in a Real Operating System
Sape J. Mullender, Pierre G. Jansen -
Zen and the Art of Research Management
John Naughton, Robert W. Taylor -
The Descent of BAN
Lawrence C. Paulson -
Brief Encounters
Brian Randell -
Retrieval System Models: What’s New?
Stephen Robertson, Karen Spärck Jones -
Slammer: An Urgent Wake-Up Call
Jerome H. Saltzer -
Caching Trust Rather Than Content
M. Satyanarayanan -
Least Privilege and More
Fred B. Schneider -
Using Sharing to Simplify System Management
Michael D. Schroeder -
An RSA-Related Number-Theoretic Surprise
Gustavus J. Simmons -
Application-Private Networks
Jonathan M. Smith -
Using the CORAL System to Discover Attacks on Security Protocols
Graham Steel, Alan Bundy, Ewen Denney -
On the Role of Binding and Rate Adaptation in Packet Networks
David Tennenhouse -
Technologies for Portable Computing
Chuck Thacker -
Multiple Alternative Voting
David Wheeler -
The Semiotics of Umbrellas
John Wilkes -
Computers for Specialized Application Areas
Maurice Wilkes
Computer Security?
Roger Needham
Roger Needham: Publications
Karen Spärck Jones