正在加载图片...
References Bolt Beranek and Newman Inc. Specifications for the interconnection of a host and an IMP Technical Report No. 1822, Cambridge, Mass, December, 1981 2. Branstad, D K. Security aspects of computer networks. AIAA Paper No. 73-427, AIAA Computer Network Systems Conference, Huntsville, Alabama, April, 1973 3. Corbato, F.J., et al. The Compatible Time-Sharing System, A Programmer's Guide M.I.T Press, Cambridge, Massachusetts, 1963, p 10 Theory, IT-22, 6,(November, 1976),pp. 644-6f S in cryptography 4. Diffie, W, and Hellman, M.E. New directions in cryptography. IEEE Trans. on Info 5. Gray, J N. Notes on database operating systems. In Operating System: An Advanced Course Volume 60 of Lecture Notes in Computer Science, Springer-Verlag, 1978, pp. 393-481 6. Greenwald, M. Remote virtual disk protocol specifications. M.I.T. Laboratory for Computer Science Technical Memorandum, in preparation. Expected publication, 1984 7. Keister, W, Ketchledge, R W, and Vaughan, H E: No. 1 ESS: System organization and objectives. Bell System Technical ournal 53, 5(part 1),(September, 1964)p. 1841 8. Kent, S.T.: Encryption-based protection protocols for interactive user-computer communication. S.M. thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 1976. Also available as M.I.T aboratory for Computer Science Technical Report, TR-162, May, 1976 9. Lampson, B W, and Sproull, R F. An open operating system for a single-user machine Proc. Seventh Symposium on Operating Systems Principles, Operating Systems Review 13 Special issue(December, 1979), pp 98-105 0. Lampson, B, and Sturgis, H: Crash recovery in a distributed data storage system. Working paper, Xerox PARC, November, 1976 and April, 1979. Submitted to CACM 11. Needham, R M, and Schroeder, M D. Using encryption for authentication in large networks of computers. CACM 21, 12,(December, 1978), pp. 993-999 12. Popek, G.J., et al. UCLA data secure unix. Proc. 1979 NCC, AFIPS Press, pp 355-364 13. Reed, D P. Implementing atomic actions on decentralized data. ACM Transactions on omputer Systems 1, 1(February, 1983), pp 3-23 14. Reed, D P. Naming and synchronization in a decentralized computer system. Ph. D. thesis Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, September 1978. Also available as M I.T. Laboratory for Computer Science Technical Report, TR-205, September, 1978 15. Reed, D.P., and Svobodova, L. SWALLOW: A distributed data storage system for a local network. In West, A, and Janson, P, ed Local Networks for Computer Communications, Proc. IFIP Working Group 6.4 International Workshop on Local Networks. North-Holland msterdam, 1981, pp.355-373 16. Schroeder, M.D., Clark, DD, and Saltzer, J.H. The Multics kernel design project. Proc Sixth Symposium on Operating Systems Principles, Operating Systems Review 11,5 November, 1977, )pp43-56 17. Stern, J.A.: Backup and recovery of on-line information in a computer utility. S M. thesis, M.I.T. Department of Electrical Engineering and Computer Science, August 1973. Available as M.I.T. Project MAC Technical Report TR-116, January, 1974SALTZER ET AL. End-to-End Arguments in System Design 10 References 1. Bolt Beranek and Newman Inc. Specifications for the interconnection of a host and an IMP. Technical Report No. 1822, Cambridge, Mass., December, 1981. 2. Branstad, D.K. Security aspects of computer networks. AIAA Paper No. 73-427, AIAA Computer Network Systems Conference, Huntsville, Alabama, April, 1973. 3. Corbato, F.J., et al. The Compatible Time-Sharing System, A Programmer's Guide. M.I.T. Press, Cambridge, Massachusetts, 1963, p.10. 4. Diffie, W., and Hellman, M.E. New directions in cryptography. IEEE Trans. on Info. Theory, IT-22, 6, (November, 1976), pp.644-654. 5. Gray, J.N. Notes on database operating systems. In Operating System: An Advanced Course. Volume 60 of Lecture Notes in Computer Science, Springer-Verlag, 1978, pp.393-481. 6. Greenwald, M. Remote virtual disk protocol specifications. M.I.T. Laboratory for Computer Science Technical Memorandum, in preparation. Expected publication, 1984. 7. Keister, W., Ketchledge, R.W., and Vaughan, H.E.: No. 1 ESS: System organization and objectives. Bell System Technical Journal 53, 5 (part 1), (September, 1964) p. 1841. 8. Kent, S.T.: Encryption-based protection protocols for interactive user-computer communication.: S.M. thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 1976. Also available as M.I.T. Laboratory for Computer Science Technical Report, TR-162, May, 1976. 9. Lampson, B.W., and Sproull, R.F. An open operating system for a single-user machine. Proc. Seventh Symposium on Operating Systems Principles, Operating Systems Review 13, Special issue (December, 1979), pp.98-105. 10. Lampson, B., and Sturgis, H: Crash recovery in a distributed data storage system. Working paper, Xerox PARC, November, 1976 and April, 1979. Submitted to CACM. 11. Needham, R.M., and Schroeder, M.D.: Using encryption for authentication in large networks of computers. CACM 21, 12, (December, 1978), pp.993-999. 12. Popek, G.J., et al.: UCLA data secure unix. Proc. 1979 NCC, AFIPS Press, pp.355-364. 13. Reed, D.P.: Implementing atomic actions on decentralized data. ACM Transactions on Computer Systems 1, 1 (February, 1983), pp.3-23. 14. Reed, D.P.: Naming and synchronization in a decentralized computer system. Ph.D. thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, September 1978. Also available as M.I.T. Laboratory for Computer Science Technical Report, TR-205, September, 1978. 15. Reed, D.P., and Svobodova, L.: SWALLOW: A distributed data storage system for a local network. In West, A., and Janson, P., ed. Local Networks for Computer Communications, Proc. IFIP Working Group 6.4 International Workshop on Local Networks. North-Holland, Amsterdam, 1981, pp.355-373. 16. Schroeder, M.D., Clark, D.D., and Saltzer, J.H.: The Multics kernel design project. Proc. Sixth Symposium on Operating Systems Principles, Operating Systems Review 11, 5 (November, 1977,) pp.43-56. 17. Stern, J.A.: Backup and recovery of on-line information in a computer utility. S.M. thesis, M.I.T. Department of Electrical Engineering and Computer Science, August 1973. Available as M.I.T. Project MAC Technical Report TR-116, January, 1974
<<向上翻页
©2008-现在 cucdc.com 高等教育资讯网 版权所有