Segmentation and the Design of Multiprogrammed Computer Systems
Journal of the ACM (JACM)
The linking segment subprogram language and linking loader
Communications of the ACM
Program organization and record keeping for dynamic storage allocation
Communications of the ACM
ACM '64 Proceedings of the 1964 19th ACM national conference
PROGRAM STRUCTURE IN A MULTI-ACCESS COMPUTER
PROGRAM STRUCTURE IN A MULTI-ACCESS COMPUTER
The Compatible Time-Sharing System: A Programmer's Guide
The Compatible Time-Sharing System: A Programmer's Guide
ACM Computing Surveys (CSUR) - The MIT Press scientific computation series
The microarchitecture of a capability-based computer
MICRO 19 Proceedings of the 19th annual workshop on Microprogramming
The schematic protection model: its definition and analysis for acyclic attenuating schemes
Journal of the ACM (JACM)
An adaptation of dataflow methods for WYSIWYG document processing
DOCPROCS '88 Proceedings of the ACM conference on Document processing systems
Object-oriented programming in scheme
LFP '88 Proceedings of the 1988 ACM conference on LISP and functional programming
Cedar Fortran and other Vector and parallel Fortran dialects
Proceedings of the 1988 ACM/IEEE conference on Supercomputing
Lightweight remote procedure call
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Lightweight remote procedure call
ACM Transactions on Computer Systems (TOCS)
Experiences with the Amoeba distributed operating system
Communications of the ACM
High level support for divide-and-conquer parallelism
Proceedings of the 1991 ACM/IEEE conference on Supercomputing
Programming-in-the-large: past, present, and future
ICSE '92 Proceedings of the 14th international conference on Software engineering
Extensible access control for a hierarchy of servers
ACM SIGOPS Operating Systems Review
Sharing and protection in a single-address-space operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
ACM SIGPLAN Notices
Operating system support for persistent and recoverable computations
Communications of the ACM
Application performance and flexibility on exokernel systems
Proceedings of the sixteenth ACM symposium on Operating systems principles
Meta objects for access control: extending capability-based security
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Retrospective: a preliminary architecture for a basic data flow processor
25 years of the international symposia on Computer architecture (selected papers)
A cost-effective, high-bandwidth storage architecture
Proceedings of the eighth international conference on Architectural support for programming languages and operating systems
Meta objects for access control: a formal model for role-based principals
Proceedings of the 1998 workshop on New security paradigms
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
EROS: a fast capability system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Security architecture for component-based operating systems
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Parallel Program Schemata and Maximal Parallelism I. Fundamental Results
Journal of the ACM (JACM)
Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Third Generation Computer Systems
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
A Survey of Some Theoretical Aspects of Multiprocessing
ACM Computing Surveys (CSUR)
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
Surveyor's Forum: An Error Recovery
ACM Computing Surveys (CSUR)
Surveyor's Forum: An Error Recovery
ACM Computing Surveys (CSUR)
Corrigenda: “A Tutorial on Algol 68”
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Concepts and Notations for Concurrent Programming
ACM Computing Surveys (CSUR)
Implementing atomic actions on decentralized data
ACM Transactions on Computer Systems (TOCS)
Interprocess communication and processor dispatching on the Intel 432
ACM Transactions on Computer Systems (TOCS)
The working set model for program behavior
Communications of the ACM - Special 25th Anniversary Issue
CLOG:6,SM,©,21an Ada® package for automatic footnote generation in UnixTM
Communications of the ACM
ACM president's letter: are operating systems obsolete?
Communications of the ACM
Cryptographic sealing for information secrecy and authentication
Communications of the ACM
Parallel programs: proofs, principles, and practice
Communications of the ACM
A model for and discussion of multi-interpreter systems
Communications of the ACM
A language extension for expressing constraints on data access
Communications of the ACM
Communications of the ACM
Protection in operating systems
Communications of the ACM
Communications of the ACM
An operating system based on the concept of a supervisory computer
Communications of the ACM
A hardware architecture for implementing protection rings
Communications of the ACM
A system for interprocess communication in a resource sharing computer network
Communications of the ACM
Protection in programming languages
Communications of the ACM
Process management and resource sharing in the multiaccess system in ESOPE
Communications of the ACM
Virtual memory, processes, and sharing in MULTICS
Communications of the ACM
The working set model for program behavior
Communications of the ACM
A scheduling philosophy for multiprocessing systems
Communications of the ACM
Three criteria for designing computing systems to facilitate debugging
Communications of the ACM
Compact finite difference schemes for ocean models: 1. Ocean waves
Journal of Computational Physics
On multiprogramming, machine coding, and computer organization
Communications of the ACM
Synchronization in a parallel-accessed data base
Communications of the ACM
A multiprogramming monitor for small machines
Communications of the ACM
A case study in programming for parallel-processors
Communications of the ACM
SHARER, a time sharing system for the CDC 6600
Communications of the ACM
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
Operating Systems: A statistical model for console behavior in multiuser computers
Communications of the ACM
Synchronizing processors with memory-content-generated interrupts
Communications of the ACM
Communications of the ACM
A component model for stardardized web-based education
Proceedings of the 10th international conference on World Wide Web
Access control in configurable systems
Secure Internet programming
Secure Internet programming
Protection in a distributed document processing system
ACM SIGOPS Operating Systems Review
EW 2 Proceedings of the 2nd workshop on Making distributed systems work
Role-based access control and the access control matrix
ACM SIGOPS Operating Systems Review
Components + security = OS extensibility
ACSAC '01 Proceedings of the 6th Australasian conference on Computer systems architecture
User interfaces when and where they are needed: an infrastructure for recombinant computing
Proceedings of the 15th annual ACM symposium on User interface software and technology
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
The Post-Game Analysis Framework-Developing Resource Management Strategies for Concurrent Systems
IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Parallel and Distributed Systems
A Notation for Deterministic Cooperating Processes
IEEE Transactions on Parallel and Distributed Systems
An end-to-end approach to globally scalable network storage
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
A hardware implementation of capability-based addressing
ACM SIGARCH Computer Architecture News
ACM SIGARCH Computer Architecture News
A machine-oriented resource management architecture
ISCA '75 Proceedings of the 2nd annual symposium on Computer architecture
An Analysis of Access Control Models
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Capabilities for Sharing: A Generalisation of Uniqueness and Read-Only
ECOOP '01 Proceedings of the 15th European Conference on Object-Oriented Programming
MIERA: Method for Inter-Enterprise Role-Based Authorization
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
An Object-Oriented Abstract Machine as the Substrate for an Object-Oriented Operating System
ECOOP '97 Proceedings of the Workshops on Object-Oriented Technology
Design Evolution of the EROS Single-Level Store
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
A Flexible Containment Mechanism for Executing Untrusted Code
Proceedings of the 11th USENIX Security Symposium
Capability-Based Financial Instruments
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
The Open-End Argument for Private Computing
HUC '99 Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing
A security model for distributed product data management system
Computers in Industry - Advanced web technologies for industrial applications
Fresh Breeze: a multiprocessor chip architecture guided by modular programming principles
ACM SIGARCH Computer Architecture News
ACM SIGOPS Operating Systems Review
A proposal for certain process management and intercommunication primitives
ACM SIGOPS Operating Systems Review
Design and implementation of a portable database system for small computers
SIGSMALL '81 Proceedings of the 1981 ACM SIGSMALL symposium on Small systems and SIGMOD workshop on Small database systems
A hardware architecture for controlling information flow
ISCA '78 Proceedings of the 5th annual symposium on Computer architecture
Storage concepts in a software-reliability-directed computer architecture
ISCA '78 Proceedings of the 5th annual symposium on Computer architecture
Hardware support for concurrent programming in loosely coupled multiprocessors
ISCA '78 Proceedings of the 5th annual symposium on Computer architecture
A server host system on the ARPANET
SIGCOMM '77 Proceedings of the fifth symposium on Data communications
Limitations of synchronization primitives with conditional branching and global variables
STOC '74 Proceedings of the sixth annual ACM symposium on Theory of computing
Two PARALLEL EULER run time models: The dangling reference, impostor environment, and label problems
HLLCA '73 Proceedings of the ACM-IEEE symposium on High-level-language computer architecture
DAC '76 Proceedings of the 13th Design Automation Conference
Software reliability and design: A survey
DAC '76 Proceedings of the 13th Design Automation Conference
ACM '69 Proceedings of the 1969 24th national conference
Machine organization for multiprogramming
ACM '67 Proceedings of the 1967 22nd national conference
Process synchronization without long-term interlock
SOSP '71 Proceedings of the third ACM symposium on Operating systems principles
On protection in operating systems
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Overview of the Hydra Operating System development
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Reflections on the verification of the security of an operating system kernel
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
A simple software environment based on objects and relations
SLIPE '85 Proceedings of the ACM SIGPLAN 85 symposium on Language issues in programming environments
An experimental implementation of the kernel/domain architecture
SOSP '73 Proceedings of the fourth ACM symposium on Operating system principles
The design of an object oriented architecture
ISCA '84 Proceedings of the 11th annual international symposium on Computer architecture
Process structuring, synchronization, and recovery using atomic actions
Proceedings of an ACM conference on Language design for reliable software
On attaining reliable software for a secure operating system
Proceedings of the international conference on Reliable software
Multiprocessor software design
ACM '80 Proceedings of the ACM 1980 annual conference
A new approach to construction of computer systems
ACM '75 Proceedings of the 1975 annual conference
A model highlighting the security of operating systems
ACM '74 Proceedings of the 1974 annual conference - Volume 1
Principles of computer system organization
SIGCSE '70 Proceedings of the first SIGCSE technical symposium on Education in computer science
Database sharing: A study of interference, roadblock and deadlock
SIGFIDET '72 Proceedings of 1972 ACM-SIGFIDET workshop on Data description, access and control
An implementation of a multiprocessing computer system
SOSP '67 Proceedings of the first ACM symposium on Operating System Principles
Virtual memory, processes, and sharing in Multics
SOSP '67 Proceedings of the first ACM symposium on Operating System Principles
The working set model for program behavior
SOSP '67 Proceedings of the first ACM symposium on Operating System Principles
A scheduling philosophy for multi-processing systems
SOSP '67 Proceedings of the first ACM symposium on Operating System Principles
Three criteria for designing computing systems to facilitate debugging
SOSP '67 Proceedings of the first ACM symposium on Operating System Principles
A user-controlled synchronization method
ACM SIGOPS Operating Systems Review
Process synchronization without long-term interlock
ACM SIGOPS Operating Systems Review
A hardware implementation of capability-based addressing
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
A technique for passing reference parameters in an information-hiding architecture
ACM SIGARCH Computer Architecture News
A State-Transition Model of Trust Management and Access Control
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Principles of computer system organization
ACM SIGCSE Bulletin
An end-to-end approach to globally scalable programmable networking
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Improving the reliability of commodity operating systems
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Two parallel EULER run time models: the dangling reference, impostor environment, and label problems
HLLCA '73 Proceedings of a symposium on High-level-language computer architecture
Process management and resource sharing in the multiaccess system "ESOPE"
SOSP '69 Proceedings of the second symposium on Operating systems principles
The multics interprocess communication facility
SOSP '69 Proceedings of the second symposium on Operating systems principles
Progress: a programming language for real-time systems
ACM SIGPLAN Notices
A survey of control structures in programming languages
ACM SIGPLAN Notices - Special issue on control structures in programming languages
ACM SIGMIS Database
A computer system supporting data abstraction
ACM SIGOPS Operating Systems Review
A computer system supporting data abstraction
ACM SIGOPS Operating Systems Review
An overview of the Amoeba distributed operating system
ACM SIGOPS Operating Systems Review
Improving the reliability of commodity operating systems
ACM Transactions on Computer Systems (TOCS)
Encyclopedia of Computer Science
ACM SIGPLAN Notices
Heap protection for Java virtual machines
PPPJ '06 Proceedings of the 4th international symposium on Principles and practice of programming in Java
Architectural support for software-based protection
Proceedings of the 1st workshop on Architectural and system support for improving software dependability
Coordination with multicapabilities
Science of Computer Programming
Rendezvous-based access control for medical records in the pre-hospital environment
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
Hardware works, software doesn't: enforcing modularity with Mondriaan memory protection
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Constructing services with interposable virtual hardware
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
A secure javaTM virtual machine
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
TRON: process-specific file protection for the UNIX operating system
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
Domain and type enforcement for linux
ALS'00 Proceedings of the 4th annual Linux Showcase & Conference - Volume 4
A critique of the GNU hurd multi-server operating system
ACM SIGOPS Operating Systems Review
Formal Models of Capability-Based Protection Systems
IEEE Transactions on Computers
Access control for the services oriented architecture
Proceedings of the 2007 ACM workshop on Secure web services
A cryptographic access control architecture secure against privileged attackers
Proceedings of the 2007 ACM workshop on Computer security architecture
Non-volatile memory and disks:: avenues for policy architectures
Proceedings of the 2007 ACM workshop on Computer security architecture
Record of the Project MAC conference on concurrent systems and parallel computation
Java heap protection for debugging native methods
Science of Computer Programming
Hardbound: architectural support for spatial safety of the C programming language
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
Privilege separation made easy: trusting small libraries not big processes
Proceedings of the 1st European Workshop on System Security
Decentralized access control in distributed file systems
ACM Computing Surveys (CSUR)
PULSE: a pluggable user-space Linux security environment
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Verified Protection Model of the seL4 Microkernel
VSTTE '08 Proceedings of the 2nd international conference on Verified Software: Theories, Tools, Experiments
Kernel design for isolation and assurance of physical memory
Proceedings of the 1st workshop on Isolation and integration in embedded systems
Non-delegatable authorities in capability systems
Journal of Computer Security
Development of executive routines, both hardware and software
AFIPS '67 (Fall) Proceedings of the November 14-16, 1967, fall joint computer conference
Control of sequence and parallelism in modular programs
AFIPS '68 (Spring) Proceedings of the April 30--May 2, 1968, spring joint computer conference
TSS/360: a time-shared operating system
AFIPS '68 (Fall, part I) Proceedings of the December 9-11, 1968, fall joint computer conference, part I
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
A compatible airborne multiprocessor
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
The formulary model for flexible privacy and access controls
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
Project SUE as a learning experience
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
Database sharing: an efficient mechanism for supporting concurrent processes
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
An overview of the distributed computer network
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Research in data security: policies and projects
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Proceedings of the 2008 workshop on New security paradigms
Fabric: a platform for secure distributed computation and storage
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
On The Advantages of Tagged Architecture
IEEE Transactions on Computers
A Comparison of Some Theoretical Models of Parallel Computation
IEEE Transactions on Computers
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Hierarchical control programs for systems evaluation
IBM Systems Journal
The authorization problem in shared files
IBM Systems Journal
Hypervisors for consumer electronics
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
On the exchange of information
SIGFIDET '70 Proceedings of the 1970 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
Communications of the ACM
seL4: formal verification of an operating-system kernel
Communications of the ACM
Isolating untrusted software extensions by custom scoping rules
Computer Languages, Systems and Structures
Making policy decisions disappear into the user's workflow
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Multi-layer audit of access rights
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
capDL: a language for describing capability-based systems
Proceedings of the first ACM asia-pacific workshop on Workshop on systems
The long quest for universal information access
Communications of the ACM
The road to trustworthy systems
Proceedings of the fifth ACM workshop on Scalable trusted computing
Towards proving security in the presence of large untrusted components
SSV'10 Proceedings of the 5th international conference on Systems software verification
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Complementarity in competence management: framework and implementation
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
From a proven correct microkernel to trustworthy large systems
FoVeOOS'10 Proceedings of the 2010 international conference on Formal verification of object-oriented software
IEEE Transactions on Computers - Special issue on parallel processors and processing
Provable Security: how feasible is it?
HotOS'13 Proceedings of the 13th USENIX conference on Hot topics in operating systems
Experiments with the Fresh Breeze tree-based memory model
Computer Science - Research and Development
Vistas: towards behavioural cloud control
Euro-Par 2010 Proceedings of the 2010 conference on Parallel processing
ITP'11 Proceedings of the Second international conference on Interactive theorem proving
Logical attestation: an authorization architecture for trustworthy computing
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
A mechanism for secure, fine-grained dynamic provisioning of applications on small devices
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
The structure of authority: why security is not a separable concern
MOZ'04 Proceedings of the Second international conference on Multiparadigm Programming in Mozart/Oz
Coordination with multicapabilities
COORDINATION'05 Proceedings of the 7th international conference on Coordination Models and Languages
Covert channel analysis of the password-capability system
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
Discretionary capability confinement
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Implementing a high-assurance smart-card OS
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Capabilities for information flow
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security
Improving interrupt response time in a verifiable protected microkernel
Proceedings of the 7th ACM european conference on Computer Systems
Visualizing privacy implications of access control policies in social network systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Dependable and Historic Computing
The structure and comparison of three real-time operating systems for process control
Automatica (Journal of IFAC)
CONCUR: A language for continuous, concurrent processes
Computer Languages
Software development for reliable software systems
Journal of Systems and Software
Configurable fine-grain protection for multicore processor virtualization
Proceedings of the 39th Annual International Symposium on Computer Architecture
To preempt or not to preempt, that is the question
Proceedings of the Asia-Pacific Workshop on Systems
BottleCap: a credential manager for capability systems
Proceedings of the seventh ACM workshop on Scalable trusted computing
To preempt or not to preempt, that is the question
APSys'12 Proceedings of the Third ACM SIGOPS Asia-Pacific conference on Systems
Building high assurance secure applications using security patterns for capability-based platforms
Proceedings of the 2013 International Conference on Software Engineering
The need for capability policies
Proceedings of the 15th Workshop on Formal Techniques for Java-like Programs
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
ACM SIGOPS 24th Symposium on Operating Systems Principles
From L3 to seL4 what have we learnt in 20 years of L4 microkernels?
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
Heap decomposition inference with linear programming
ECOOP'13 Proceedings of the 27th European conference on Object-Oriented Programming
Comprehensive formal verification of an OS microkernel
ACM Transactions on Computer Systems (TOCS)
Hi-index | 48.73 |
The semantics are defined for a number of meta-instructions which perform operations essential to the writing of programs in multiprogrammed computer systems. These meta-instructions relate to parallel processing, protecting of separate computations, program debugging, and the sharing among users of memory segments and other computing objects, the names of which are hierarchically structured. The language sophistication contemplated is midway between an assembly language and an advanced algebraic language.