00-Frontmatter.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Hints and Principles for Computer System Design Butler Lampson May 14, 2021
Hints and Principles for Computer System Design Butler Lampson May 14, 2021 Abstract This new long version of my 1983 paper suggests the goals you might have for your system— Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY)—and techniques for achieving them—Approximate, Incremental, Divide & Conquer (AID). It also gives some princi- ples for system design that are more than just hints, and many examples of how to apply the ideas. Table of Contents 1. Introduction 3 1.1 Oppositions and slogans 4 2. Principles 6 2.1 Abstraction 6 2.1.1 Safety and liveness 8 2.1.2 Operations 9 2.2 Writing a spec 9 2.2.1 Leaky specs and bad specs 12 2.2.2 Executable specs 13 2.3 Writing the code: Correctness 13 2.3.1 Types 16 2.3.2 Languages 16 2.4 Modules and interfaces 17 2.4.1 Classes and objects 18 2.4.2 Layers and platforms 20 2.4.3 Components 21 2.4.4 Open systems 21 2.4.5 Robustness 22 2.4.6 Standards 23 2.5 Points of view 23 2.5.1 Notation 24 3. Goals and Techniques 25 3.1 Overview 25 3.1.1 Goals 25 3.1.2 Techniques 26 3.2 Simple 27 3.2.1 Do one thing well 27 3.2.2 Brute force 29 3.2.3 Reduction 30 3.3 Timely 30 3.4 Efficient 31 3.4.1 Before the ABCs 31 3.4.2 Algorithms 36 3.4.3 Approximate 37 3.4.4 Batch 42 1 3.4.5 Cache 43 3.4.6 Concurrency 44 3.5 Adaptable 50 3.5.1 Scaling 51 3.5.2 Inflection points 52 3.6 Dependable 53 3.6.1 Correctness 55 3.6.2 Retry 56 3.6.3 Replication 57 3.6.4 Detecting failures: real time 59 3.6.5 Recovery and repair 60 3.6.6 Transactions 60 3.6.7 Security 61 3.7 Yummy 64 3.7.1 User interfaces 64 3.8 Incremental 66 3.8.1 Being and becoming 66 3.8.2 Indirection 70 4. -
Report on the Workshop on Fundamental Issues in Distributed Computing
Report on the Workshop on Fundamental Issues in Distributed Computing Fall brook, California December 15-17, 1980 Sponsored by the Association for Computing Machinery, SlGOPS and SIGPLAN Prog ram Chairperson: Barbara Liskov, MIT Laboratory for Computer Science Program Committee: Jim Gray, Tandem Computers Anita Jones, Carnegie Mellon University Butler Lampson, Xerox PARC Jerry Popek, University of California at Los Angeles David Reed, MIT Laboratory for Computer Science Local Arrangements: Bruce Walker, University of California at Los Angeles Transcription and Editing: Maurice Herlihy, MIT Laboratory for Computer Science Gerald Leitner, University of California at Los Angeles Karen Sollins, MIT Laboratory for Computer Science 9 1. Introduction Barbara Liskov A workshop on fundamental issues in distributed computing was held at the Pala Mesa Resort, Fallbrook, California, on December 15-17, 1980. The purpose of the meeting was to offer researchers in the areas of systems and programming languages a forum for exchange of ideas about the rapidly expanding research area of distributed computing. Our goal was to try and enhance understanding of fundamental issues, but from a practical perspective. We were not looking for a theory of distributed computing, but rather for an understanding of important concepts arising from practical work. Accordingly, the program committee organized the workshop around the set of concepts that we felt were significant. The sessions were organized as follows: Session Title Leader Real Systems Jim Gray Atomicity David Reed Protection Jerry Popek Applications Rich Rashid Naming Jerry Popek Communications Butler Lampson What do We Need from Theory Sue Owicki What are Important Practical Problems Barbara Liskov The sessions were oriented toward discussion rather than formal presentation. -
Annotated Bibliography 13 and References Those Who Cannot Remember the Past Are Condemned to Repeat It
32697 13 299-320 r7jk.ps 1/4/06 1:04 PM Page 299 Annotated Bibliography 13 and References Those who cannot remember the past are condemned to repeat it. George Santayana Annotated Bibliography: An Emerging Literature What follows is a noncomprehensive bibliography of software security pub- lications. This list is heavily biased toward recent publications. The refer- ences here can serve as a springboard to the wider literature. Below each reference is a brief description of the work and its place in the literature. All opinions are mine. The bibliography is divided into three sections. First is a very short list of required reading (the top five list for software security). Second is a com- plete list of all references cited in this book. Third is a list of other important software security references not otherwise mentioned in this book. There are overlaps only between the required reading list and the other two lists. Required Reading: The Top Five This is a completely biased list of the top five publications to read in soft- ware security (presented in alphabetical order). If you have time to read only a handful of stuff, read everything on this list first. 1. [Anderson 2001] Ross Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley and Sons, New York, 2001. <http://www.cl.cam.ac.uk/~rja14/book.html> This is probably the best security book on the market. If you can buy only one other book relevant to software security, buy this one. Security Engineering is about building systems that remain depend- able in the face of malicious attack, unintentional error, or accident. -
An Interview with PETER J. DENNING, Oral History 423, Conducted by Jeffrey R
Calhoun: The NPS Institutional Archive DSpace Repository Faculty and Researchers Faculty and Researchers Collection 2013-04-10 An Interview with PETER J. DENNING, Oral History 423, Conducted by Jeffrey R. Yost on 10 April 2013 Monterey, California: Naval Postgraduate School. http://hdl.handle.net/10945/37925 Downloaded from NPS Archive: Calhoun An Interview with PETER J. DENNING OH 423 Conducted by Jeffrey R. Yost on 10 April 2013 Computer Security History Project Naval Postgraduate School, Monterey, CA Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright, Charles Babbage Institute Peter J. Denning Interview 10 April 2013 Oral History 423 Abstract This interview focuses on Peter Denning’s pioneering early contributions to computer security. This includes discussion of his perspective on CTSS and Multics as a graduate student at MIT, pioneering (with his student Scott Graham) the critical computer security concept of a reference monitor for each information object as a young faculty member at Princeton University, and his continuing contributions to the computer security field in his first years as a faculty member at Purdue University. Because of an extensive, career spanning oral history done with Denning as part of the ACM Oral History series (which includes his contributions as President of ACM, research on operating systems, and principles of computer science), this interview is primarily limited to Denning’s early career when computer security was one of his fundamental research areas. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.” 2 Yost: My name is Jeffrey Yost and I’m here today on the campus of Naval Postgraduate School with Professor Peter Denning. -
An Interview With
An Interview with PETER J. DENNING OH 423 Conducted by Jeffrey R. Yost on 10 April 2013 Computer Security History Project Naval Postgraduate School, Monterey, CA Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright, Charles Babbage Institute Peter J. Denning Interview 10 April 2013 Oral History 423 Abstract This interview focuses on Peter Denning’s pioneering early contributions to computer security. This includes discussion of his perspective on CTSS and Multics as a graduate student at MIT, pioneering (with his student Scott Graham) the critical computer security concept of a reference monitor for each information object as a young faculty member at Princeton University, and his continuing contributions to the computer security field in his first years as a faculty member at Purdue University. Because of an extensive, career spanning oral history done with Denning as part of the ACM Oral History series (which includes his contributions as President of ACM, research on operating systems, and principles of computer science), this interview is primarily limited to Denning’s early career when computer security was one of his fundamental research areas. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.” 2 Yost: My name is Jeffrey Yost and I’m here today on the campus of Naval Postgraduate School with Professor Peter Denning. This is an interview for CBI’s NSF-funded project, “Building an Infrastructure for Computer Security History.” It’s April 10, 2013. Because of your lengthy, publicly available ACM oral history, I’ll focus pretty much on the topic of computer security but I’d like to get some basic biographical information first.