ACM Computing Surveys (CSUR) - The MIT Press scientific computation series
Implementing remote procedure calls
ACM Transactions on Computer Systems (TOCS)
Distributed Operating Systems: The Logical Design
Distributed Operating Systems: The Logical Design
Safe and Secure Computing Systems
Safe and Secure Computing Systems
Capability-Based Computer Systems
Capability-Based Computer Systems
Identifiers (Naming) in Distributed Systems
Distributed Systems - Architecture and Implementation, An Advanced Course
Object Migration and Authentication
IEEE Transactions on Software Engineering
Hi-index | 0.00 |
This paper presents some basic principles for the design of secure object oriented operating systems. The security relies on the control of right to call an object method. Capabilities are used to implement the control scheme. Our capabilities are named to enforce security (capabilities don't have to be keep secret) and provide a per entity controlled propagation scheme. The propagated capabilities can be limited in different ways for different applications. Capability implementation, creation and rights propagation are discussed. Object migration and garbage collection are presented. We also introduce the problems of time synchronization and distribution of the public key server.