Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8-11 May 1990, Bremen, West Germany
نام نخستين پديدآور
edited by John Rosenberg, J. Leslie Keedy.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
London
نام ناشر، پخش کننده و غيره
Springer London
تاریخ نشرو بخش و غیره
1990
مشخصات ظاهری
نام خاص و کميت اثر
(xviii, 394 pages 125 illustrations)
فروست
عنوان فروست
Workshops in computing.
یادداشتهای مربوط به مندرجات
متن يادداشت
Principles and Models: dimensions of addressing schemes, protection in persistent object systems --; Security: Charging in a secure environment, algorithms for data encryption --; Architectures: Active memory for managing persistent objects, support system reliability and security --; Fault Tolerant Systems: Stability in a persistent store based on a large virtual memory, stability in a network of MONADS-PC computers --; Operating Systems: Homogeneous memory management, combining verified and adaptive system components towards more secure computer architectures --; Persistence and Databases: Transactions in a segmented single level store architecture, towards new architectures for distributed autonomous database applications.
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
This volume presents the Proceedings of the International Workshop on Computer Architecures to Support Security and Persistence of Information, which was held in Bremen, West Germany, from 8 to 11 May 1990. The papers provide state-of-the-art details of current research into topics including persistent architectures, security, capability-based addressing and operating systems. Persistent systems are systems which support the creation and manipulation of objects in a uniform manner, regardless of how long they persist. This is in direct contrast to conventional systems where temporary and permanent objects are handled by separate mechanisms. The workshop brought together researchers in the areas of persistence and security to discuss issues related to architectural support for security and, as a result, capability-based protection schemes receive considerable attention. The implications of these architectures for software, in particular operating systems and databases, is the topic of several of the papers.
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer science.
موضوع مستند نشده
Software engineering.
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )