Search For:

Displaying 1-18 out of 18 total
A Global Authentication Service without Global Trust
Found in: Security and Privacy, IEEE Symposium on
By Andrew D. Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
Issue Date:April 1986
pp. 223
This paper describes a design for an authentication service for a very large scale, very long lifetime, distributed system. The paper introduces a methodology for describing authentication protocols that makes explicit the trust relationships amongst the p...
 
Creating Widely Accessible Spatial Interfaces: Mobile VR for Managing Persistent Pain
Found in: IEEE Computer Graphics and Applications
By D. Schroeder,F. Korsakov,J. Jolton,F. J. Keefe,A. Haley,D. F. Keefe
Issue Date:May 2013
pp. 82-88
Using widely accessible VR technologies, researchers have implemented a series of multimodal spatial interfaces and virtual environments. The results demonstrate the degree to which we can now use low-cost (for example, mobile-phone based) VR environments ...
 
Exploratory Visualization of Surgical Training Databases for Improving Skill Acquisition
Found in: IEEE Computer Graphics and Applications
By D. Schroeder,T. Kowalewski,L. White,J. Carlis,E. Santos,R. Sweet,T. S. Lendvay,T. Reihsen,D.F. Keefe
Issue Date:November 2012
pp. 71-81
A new visualization system analyzes multidimensional surgical performance databases of information collected via emerging surgical robot and simulator technologies. In particular, it has visualized force, position, rotation, and synchronized video data fro...
 
Current work on authentication
Found in: Proceedings of the workshop on Making distributed systems work (EW 2)
By Andrew D. Birrell, Butler W. Lampson, Michael D. Schroeder, Roger M. Needham
Issue Date:September 1986
pp. 1-2
There is a need to design distributed systems that are not rigid in their choice of algorithms and that are responsive to faults/failures and performance degradation. To meet this challenge, we formalize and experiment with design principles that allow the...
     
Experience with Grapevine (Summary): the growth of a distributed system
Found in: Proceedings of the ninth ACM symposium on Operating systems principles (SOSP '83)
By Andrew D. Birrell, Michael D. Schroeder, Roger M. Needham
Issue Date:October 1983
pp. 180-189
Grapevine is a distributed, replicated system that provides message delivery, naming, authentication, resource location, and access control services in an internet of computers. The system, described in a previous paper [1], was designed and implemented se...
     
Grapevine: An exercise in distributed computing
Found in: Proceedings of the eighth symposium on Operating systems principles (SOSP '81)
By Andrew D. Birrell, Michael D. Schroeder, Roger M. Needham, Roy Levin
Issue Date:December 1981
pp. 178-179
Grapevine is a distributed, replicated system running on a large internet within the Xerox research and development community. The internet extends from coast to coast in the USA, to Canada and to Europe, and contains more than 50 Ethernet local networks l...
     
The Multics kernel design project
Found in: Proceedings of the sixth symposium on Operating systems principles (SOSP '77)
By David D. Clark, Jerome H. Saltzer, Michael D. Schroeder
Issue Date:November 1977
pp. 43-56
We describe a plan to create an auditable version of Multics. The engineering experiments of that plan are now complete. Type extension as a design discipline has been demonstrated feasible, even for the internal workings of an operating system, where many...
     
Pad and Chaff: secure approximate string matching in private record linkage
Found in: Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services (IIWAS '12)
By Aaron D. Schroeder
Issue Date:December 2012
pp. 121-125
The promise of high-quality, integrated data sets for policy analysis is great. However, significant impediments remain that make the creation of such data sets very difficult. The identification of processes and algorithms for carrying out approximate str...
     
Software clercks
Found in: Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring (EW 5)
By Michael D. Schroeder
Issue Date:September 1992
pp. 1-3
My candidate for the list of important paradigms for distributed computing is the concept of a "clerck". A clerck is software that provides distribution, replication, and location transparency to client programs (applications) in distributed systems. A cle...
     
Performance of the Firefly RPC
Found in: ACM Transactions on Computer Systems (TOCS)
By Michael Burrows, Michael D. Schroeder
Issue Date:February 1992
pp. 1-17
In this paper we report on the performance of the remote procedure call (RPC) implementation for the Firefly multiprocessor and analyze the implementation to account precisely for all measured latency. From the analysis and measurements, we estimate how mu...
     
Automatic reconfiguration in Autonet
Found in: Proceedings of the thirteenth ACM symposium on Operating systems principles (SOSP '91)
By Michael D. Schroeder, Thomas L. Rodeheffer
Issue Date:October 1991
pp. 180-189
Shared memory is an effective and efficient paradigm for interprocess communication. We are concerned with software that makes use of shared memory in a single site system and its extension to a multimachine environment. Here we describe the design of a di...
     
Autonomy or interdependence in distributed systems?
Found in: Proceedings of the 1988 workshop on ACM SIGOPS European workshop: Autonomy or interdependence in distributed systems? (EW 3)
By M. D. Schroeder
Issue Date:September 1988
pp. 1-3
A distributed operating system provides the same functionality and interface as a monolithic operating system. That is, for both systems the goal is to make the computing and storage facilities as provided by the hardware available to the users of the syst...
     
The Cedar file system
Found in: Communications of the ACM
By David K. Gifford, Michael D. Schroeder, Roger M. Needham
Issue Date:January 1988
pp. 288-298
The Cedar File System (CFS) is a workstation file system that provides access to both a workstation's local disk and to remote file servers via a single hierarchical name space. CFS supports a group of cooperating programmers by allowing them to both manag...
     
A caching file system for a programmer's workstation
Found in: Proceedings of the tenth ACM symposium on Operating systems principles (SOSP '85)
By David K. Gifford, Michael D. Schroeder, Roger M. Needham
Issue Date:December 1985
pp. 180-189
This paper discusses the formal verification of the design of an operating system kernel's conformance to the multilevel security property. The kernel implements multiple protection structures to support both discretionary and nondiscretionary security pol...
     
Using encryption for authentication in large networks of computers
Found in: Communications of the ACM
By Michael D. Schroeder, Roger M. Needham
Issue Date:December 1978
pp. 993-999
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and doc...
     
Engineering a security kernel for Multics
Found in: Proceedings of the fifth symposium on Operating systems principles (SOSP '75)
By Michael D. Schroeder
Issue Date:November 1975
pp. 25-32
This paper describes a research project to engineer a security kernel for Multics, a general-purpose, remotely accessed, multiuser computer system. The goals are to identify the minimum mechanism that must be correct to guarantee computer enforcement of de...
     
Report of session on concurrency
Found in: Proceeding of ACM SIGPLAN - SIGOPS interface meeting on Programming languages - operating systems
By Jack Dennis, Michael D. Schroeder
Issue Date:January 1973
pp. 577-582
This session was devoted to discussion of primitives for synchronizing the execution of concurrent processes. Jack Dennis introduced the session by noting that concurrent activity in a computer systems leads to the possibility of nondeterminacy. While most...
     
A hardware architecture for implementing protection rings
Found in: Proceedings of the third symposium on Operating systems principles (SOSP '71)
By Jerome H. Saltzer, Michael D. Schroeder
Issue Date:October 1971
pp. 42
This paper appears in the March, 1972, issue of the Communications of the ACM. Its abstract is reproduced below. Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addres...
     
 1