Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
Using encryption for authentication in large networks of computers
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of…
The protection of information in computer systems
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification by examining in depth the principles of modern protection architectures and the relation between capability systems and access control list systems.
Autonet: A High-Speed, Self-Configuring Local Area Network Using Point-to-Point Links
A sizing gage for use with an LVDT probe for producing an output signal representing the deviation of part dimension from a nominally ideal dimension, and a columnar display means comprising…
Grapevine: an exercise in distributed computing
The set of services provided by Grapevine and how its data and function are divided among computers on the internet are described and described.
This proposal takes an extra interaction between A and B but requires no extra interactions with the authentication server and no accurate distributed clock-something that can only itself be maintained at the cost of interactions (see for example Lamport and Melliar-Smith).
COOPERATION OF MUTUALLY SUSPICIOUS SUBSYSTEMS IN A COMPUTER UTILITY
- M. D. Schroeder
- Computer Science
- 1 September 1972
Practical protection mechanisms that allow mutually suspicious subsystems to cooperate in a single computation and still be protected from one another are described.
Automatic reconfiguration in Autonet
The fault monitoring and topology acquisition mechanisms that are central to automatic reconfiguration in Autonet are described.
Performance of Firefly RPC
This paper reports on the performance of the remote procedure call implementation for the Firefly multiprocessor and analyzes the implementation to account precisely for all measured latency and estimates how much faster RPC could be if certain improvements were made.
Experience with Grapevine: the growth of a distributed system
Operational experience with the Grapevine system under substantial load has proved the original design sound in most aspects, but there also have been some surprises.
Performance of the Firefly RPC
This paper reports on the performance of the remote procedure call (RPC) implementation for the Firefly multiprocessor and analyzes the implementation to account precisely for all measured latency and estimates how much faster RPC could be if certain improvements were made.