00-Frontmatter.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

00-Frontmatter.Pdf Proceedings of the Eighth Symposium on Operating Systems Principles 14-16 December 1981 Asilomar Conference Grounds Pacific Grove, California Special Interest Group on Operating Systems (SIGOPS) Association for Computing Machinery (ACM) Vol. 15 No. 5 December 1981 ACM ORDER NO. 534810 The Association for Computing Machinery, Inc. 1133 Avenue of the Americas New York, New York 10036 Copyright © 1981 by the Association for Computing Machinery, Inc. Copying without fee is permitted provided that the copies are not made or distributed for direct commercial advantage and credit to the source is given. Abstracting with credit is permitted. For other copying of articles that carry a code at the bottom of the first page, copying is permitted provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, P.O. Box 765, Schenectady, N.Y. 12301. For permission to republish write to: Director of Publications, Association for Computing Machinery. To copy otherwise, or republish, requires a fee and/or specific permission. ISBN 0-89791-062-1 Additional copies may be ordered prepaid from: ACM Order Department Price: P.O. Box 64145 Members $13.00 Baltimore, MD 21264 Non-Members $17.00 ACM Order No. 534810 'ii Eighth Symposium on Operating Systems Principles General Chairperson John Howard - IBM Research, San Jose Program Chairperson David P. Reed - MIT Program Committee David Cheriton - University of British Columbia Dorothy Denning - Purdue University Jim Gray- Tandem Computers John Howard - IBM Research, San Jose Anita Jones - Carnegie-Mellon University Butler Lampson - Xerox PARC Edward Lazowska- University of Washington Alan Smith - University of California, Berkeley Local A rrangements Sara Dake - Registration Jim Gray - Catering Gene McDaniel - Wine iii 8SOSP Referees Sten Andler Thomas H. Hinke Loretta Reid Greg Andrews Warren Jessop Glenn Ricart J.L. Baer Paul Johnson William Riddle Joel Bartlett Dennis Kafura David Russell A. Bernstein Stephen Kent Jerome Saltzer Andrew Birrell R.B. Kieburtz M. Satyanarayanan Russ Blake Walter Kohler Ashok Saxena Toby Bloom S. Krakowiak Donald Scelza J.C. Browne David Lamb Richard Schantz Roy Campbell Gerard Le Lann Robert Scheifler David Clark Keith Lantz Roger Schell Robert Cook Richard Leblanc Fred Schneider Geoffrey Cooper Roy Levin Michael Schroeder George Cox Henry Levy Karsten Schwans Doug Currie Bruce Lindsay Peter Schwarz Yogen Dalai Steven Lipner A. Shaw Roger Dannenberg Barbara Liskov Mark Sherman J. Demco John Livesey J.F. Shoch Ivor Durham David Lomet A. Silberschatz Malcolm Easton Allen Luniewski Barbara Simons P.H. Enslow Udi Manber Karen Sollins Robert Filman Paul McJones Marvin Solomon Michael Fischer John Metzner Eugene Stark Brett Fleisch Philip Mills Eric Stephenson Harry Forsdick M.F. Mitoma B. Stroustrup Robert Fowler R.M. Needham T.J. Teixeira James Frankel Peter Neumann Doug Terry W.D. Frazer Jerre D, Noe Ken Thompson David Gifford John Ousterhout William E. Weihl R.L. Gordon J. Peterson Maurice Wilkes Wayne Gramlich Wil Plouffe Robin Williams Po Harter Michael Powell Jim Wyllie Andrew Herbert Ram Rao John Zahorjan Maurice Herlihy iv Foreword Like its predecessors of the past 14 years, the Eighth Symposium on Operating Systems Principles represents the diversity and vigor of the field. The program speaks for itself. I know that I found that reading the papers was fun -- hardly a tedious task at all. All in all, 103 papers were submitted. The competition was strong -- only 23 papers were accepted m less than one in four. Of these, six were nominated to be considered for inclusion in a special issue of Communications of the ACM; five of these were accepted by a second refereeing process managed by Anita Jones. Only extended abstracts for those papers appear here. The refereeing process, conducted under tight timing constraints, went well. Unlike other conferences, SOSP tries to maintain a high standard of refereeing. Most papers were read by four of the program committee members, myself, and two outside referees. Each outside referee who volunteered was given from one to four papers in his/her area. The outside referees often perform a special service that I value highly. They usually provide many helpful comments to the author(s) to aid in revision. However, I have the general impression that the average quality of outside referee reports is decreasing somewhat. This time a larger fraction of the reports received seemed to concentrate on rating the papers only. I hope this is not indicative of a general trend. Like many conferences, this one could not have been put together without a lot of help. In addition to the referees, I'd like to thank Debra Fagin, whose help has been invaluable. David P. Reed Program Chairperson October, 1981 Conference Program 14 December 1981 Session I: Verifying Systems Properties Session Leader: John Howard Proving Real-Time Properties of Programs with Temporal Logic 1 Arthur Bernstein, Paul Harter Design and Verification of Secure Systems 12 John Rushby Session I1" Systems Session Leader: Edward Lazowska A NonStop TM Kernel 22 Joel Bartlett Observations on the Development of an Operating System 30 Hugh Lauer Session II1: Remote Data Storage Session Leader: Butler Lampson The FELIX File Server 37 Marek Fridrich, W, Older A Comparison of Two Network-Based File Servers 45 James Mitchell, Jeremy Dion A Reliable Ob/ect-Oriented Repository for a Distributed Computer System 47 Liba Svobodova Session IV: Computer-Computer Communication Session Leader: David Reed Sequencing Computation Steps in a Network 59 Andrew Herbert, Roger Needham Accent: A Communication Oriented Network Operating System Kernel 64 Richard Rashid, George Robertson Performing Remote Operations Efficiently on a Local Computer Network 76 Alfred Specter vi 15 December 1981 Session V" Memory Management Session Leader: Alan Smith Converting a Swap-Based System to do Paging in an Architecture Lacking Page-Referenced Bits 78 Ozalp Babaoglu, William Joy WSClock -- A Simple and Effective Algorithm for Virtual Memory Management 87 Richard Carr, John Hennessy A Study of File Sizes and Functional Lifetimes £6 M. Satyanarayanan Session Vl: Protection Techniques Session Leader: Dorothy Denning Hierarchical Take-Grant Protection Systems 109 Matt Bishop Cryptographic Sealing for Information Secrecy and Authentication 123 David Gifford Session VII: The iMAX-432 Operating System Session Leader: Anita Jones A Unified Model and Implementation for Interprocess Communication in a Multiprocessor Environment 125 G. Cox, W. Corwin, K. Lai, F. Pollack iMAX: A Multiprocessor Operating System for an Object- Based Computer 127 K.C. Kahn, W.M. Corwin, T.D. Dennis, H. D'Hooge, D.E. Hubka, L.A. Hutehins, J.T. Montague, F.J. Pollack, M.R. Gifldns The iMAX-432 Object Filing System 137 F. Pollack, K. Kahn, R. Wilkinson vii 16 December 1981 Session VIII" Distributed Systems Session Leader: David Cheriton The Architecture of the Eden System 148 E. Lazowska, H. Levy, G. Almes, M. Fischer, R. Fowler, S. Vestal A Distributed UNIX System Based on a Virtual Circuit Switch 160 G.W.R. Luderer, H. Che, J.P. Haggerty, P.A. Kirslis, W.T. Marshall LOCUS: A Network Transparent, High Reliability Distributed System 169 G. Popek, B. Walker, J. Chow, D. Edwards, C. Kline, G. Rudisin, G. Thiel Session IX: User-Oriented Systems Session Leader: Jim Gray Grapevine. An Exercise in Distributed Computing 178 Andrew Birrell, Roger Levin, Roger Needham, Michael Schroeder BRUWIN: An Adaptable Design Strategy for Window Manager/Virtual Terminal Systems 180 Norman Meyrowitz, Margaret Moser viii .
Recommended publications
  • Hints and Principles for Computer System Design Butler Lampson May 14, 2021
    Hints and Principles for Computer System Design Butler Lampson May 14, 2021 Abstract This new long version of my 1983 paper suggests the goals you might have for your system— Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY)—and techniques for achieving them—Approximate, Incremental, Divide & Conquer (AID). It also gives some princi- ples for system design that are more than just hints, and many examples of how to apply the ideas. Table of Contents 1. Introduction 3 1.1 Oppositions and slogans 4 2. Principles 6 2.1 Abstraction 6 2.1.1 Safety and liveness 8 2.1.2 Operations 9 2.2 Writing a spec 9 2.2.1 Leaky specs and bad specs 12 2.2.2 Executable specs 13 2.3 Writing the code: Correctness 13 2.3.1 Types 16 2.3.2 Languages 16 2.4 Modules and interfaces 17 2.4.1 Classes and objects 18 2.4.2 Layers and platforms 20 2.4.3 Components 21 2.4.4 Open systems 21 2.4.5 Robustness 22 2.4.6 Standards 23 2.5 Points of view 23 2.5.1 Notation 24 3. Goals and Techniques 25 3.1 Overview 25 3.1.1 Goals 25 3.1.2 Techniques 26 3.2 Simple 27 3.2.1 Do one thing well 27 3.2.2 Brute force 29 3.2.3 Reduction 30 3.3 Timely 30 3.4 Efficient 31 3.4.1 Before the ABCs 31 3.4.2 Algorithms 36 3.4.3 Approximate 37 3.4.4 Batch 42 1 3.4.5 Cache 43 3.4.6 Concurrency 44 3.5 Adaptable 50 3.5.1 Scaling 51 3.5.2 Inflection points 52 3.6 Dependable 53 3.6.1 Correctness 55 3.6.2 Retry 56 3.6.3 Replication 57 3.6.4 Detecting failures: real time 59 3.6.5 Recovery and repair 60 3.6.6 Transactions 60 3.6.7 Security 61 3.7 Yummy 64 3.7.1 User interfaces 64 3.8 Incremental 66 3.8.1 Being and becoming 66 3.8.2 Indirection 70 4.
    [Show full text]
  • Report on the Workshop on Fundamental Issues in Distributed Computing
    Report on the Workshop on Fundamental Issues in Distributed Computing Fall brook, California December 15-17, 1980 Sponsored by the Association for Computing Machinery, SlGOPS and SIGPLAN Prog ram Chairperson: Barbara Liskov, MIT Laboratory for Computer Science Program Committee: Jim Gray, Tandem Computers Anita Jones, Carnegie Mellon University Butler Lampson, Xerox PARC Jerry Popek, University of California at Los Angeles David Reed, MIT Laboratory for Computer Science Local Arrangements: Bruce Walker, University of California at Los Angeles Transcription and Editing: Maurice Herlihy, MIT Laboratory for Computer Science Gerald Leitner, University of California at Los Angeles Karen Sollins, MIT Laboratory for Computer Science 9 1. Introduction Barbara Liskov A workshop on fundamental issues in distributed computing was held at the Pala Mesa Resort, Fallbrook, California, on December 15-17, 1980. The purpose of the meeting was to offer researchers in the areas of systems and programming languages a forum for exchange of ideas about the rapidly expanding research area of distributed computing. Our goal was to try and enhance understanding of fundamental issues, but from a practical perspective. We were not looking for a theory of distributed computing, but rather for an understanding of important concepts arising from practical work. Accordingly, the program committee organized the workshop around the set of concepts that we felt were significant. The sessions were organized as follows: Session Title Leader Real Systems Jim Gray Atomicity David Reed Protection Jerry Popek Applications Rich Rashid Naming Jerry Popek Communications Butler Lampson What do We Need from Theory Sue Owicki What are Important Practical Problems Barbara Liskov The sessions were oriented toward discussion rather than formal presentation.
    [Show full text]
  • Annotated Bibliography 13 and References Those Who Cannot Remember the Past Are Condemned to Repeat It
    32697 13 299-320 r7jk.ps 1/4/06 1:04 PM Page 299 Annotated Bibliography 13 and References Those who cannot remember the past are condemned to repeat it. George Santayana Annotated Bibliography: An Emerging Literature What follows is a noncomprehensive bibliography of software security pub- lications. This list is heavily biased toward recent publications. The refer- ences here can serve as a springboard to the wider literature. Below each reference is a brief description of the work and its place in the literature. All opinions are mine. The bibliography is divided into three sections. First is a very short list of required reading (the top five list for software security). Second is a com- plete list of all references cited in this book. Third is a list of other important software security references not otherwise mentioned in this book. There are overlaps only between the required reading list and the other two lists. Required Reading: The Top Five This is a completely biased list of the top five publications to read in soft- ware security (presented in alphabetical order). If you have time to read only a handful of stuff, read everything on this list first. 1. [Anderson 2001] Ross Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley and Sons, New York, 2001. <http://www.cl.cam.ac.uk/~rja14/book.html> This is probably the best security book on the market. If you can buy only one other book relevant to software security, buy this one. Security Engineering is about building systems that remain depend- able in the face of malicious attack, unintentional error, or accident.
    [Show full text]
  • An Interview with PETER J. DENNING, Oral History 423, Conducted by Jeffrey R
    Calhoun: The NPS Institutional Archive DSpace Repository Faculty and Researchers Faculty and Researchers Collection 2013-04-10 An Interview with PETER J. DENNING, Oral History 423, Conducted by Jeffrey R. Yost on 10 April 2013 Monterey, California: Naval Postgraduate School. http://hdl.handle.net/10945/37925 Downloaded from NPS Archive: Calhoun An Interview with PETER J. DENNING OH 423 Conducted by Jeffrey R. Yost on 10 April 2013 Computer Security History Project Naval Postgraduate School, Monterey, CA Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright, Charles Babbage Institute Peter J. Denning Interview 10 April 2013 Oral History 423 Abstract This interview focuses on Peter Denning’s pioneering early contributions to computer security. This includes discussion of his perspective on CTSS and Multics as a graduate student at MIT, pioneering (with his student Scott Graham) the critical computer security concept of a reference monitor for each information object as a young faculty member at Princeton University, and his continuing contributions to the computer security field in his first years as a faculty member at Purdue University. Because of an extensive, career spanning oral history done with Denning as part of the ACM Oral History series (which includes his contributions as President of ACM, research on operating systems, and principles of computer science), this interview is primarily limited to Denning’s early career when computer security was one of his fundamental research areas. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.” 2 Yost: My name is Jeffrey Yost and I’m here today on the campus of Naval Postgraduate School with Professor Peter Denning.
    [Show full text]
  • An Interview With
    An Interview with PETER J. DENNING OH 423 Conducted by Jeffrey R. Yost on 10 April 2013 Computer Security History Project Naval Postgraduate School, Monterey, CA Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright, Charles Babbage Institute Peter J. Denning Interview 10 April 2013 Oral History 423 Abstract This interview focuses on Peter Denning’s pioneering early contributions to computer security. This includes discussion of his perspective on CTSS and Multics as a graduate student at MIT, pioneering (with his student Scott Graham) the critical computer security concept of a reference monitor for each information object as a young faculty member at Princeton University, and his continuing contributions to the computer security field in his first years as a faculty member at Purdue University. Because of an extensive, career spanning oral history done with Denning as part of the ACM Oral History series (which includes his contributions as President of ACM, research on operating systems, and principles of computer science), this interview is primarily limited to Denning’s early career when computer security was one of his fundamental research areas. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.” 2 Yost: My name is Jeffrey Yost and I’m here today on the campus of Naval Postgraduate School with Professor Peter Denning. This is an interview for CBI’s NSF-funded project, “Building an Infrastructure for Computer Security History.” It’s April 10, 2013. Because of your lengthy, publicly available ACM oral history, I’ll focus pretty much on the topic of computer security but I’d like to get some basic biographical information first.
    [Show full text]