Introduction: Roger Needham.- On Access Control, Data Integration, and Their Languages.- Protocol Analysis, Composability and Computation.- Access Control in Distributed Systems.- Implementing Condition Variables with Semaphores.- Clumps, Clusters and Classification.- How to Implement Unnecessary Mutexes.- Bioware Languages.- The Economics of Open Systems.- From Universe to Global Internet.- Needham-Schroeder Goes to Court.- The Design of Reliable Operating Systems.- An Historical Connection between Time-Sharing and Virtual Circuits.- On Cross-Platform Security.- Distributed Computing Economics.- The Titan Influence.- Middleware? Muddleware!.- Grand Challenges for Computing Research.- Sentient Computing.- Cyber Security in Open Systems.- Software Components: Only the Giants Survive.- Security Protocols: Who Knows What Exactly?.- Volume Rendering by Ray-Casting in Shear-Image Order.- A Conceptual Authorization Model for Web Services.- The Trouble with Standards.- Novelty in the Nemesis Operating System.- A Technology Transfer Retrospective.- An Optical LAN.- What’s in a Name?.- The Cryptographic Role of the Cleaning Lady.- Real Time in a Real Operating System.- Zen and the Art of Research Management.- The Descent of BAN.- Brief Encounters.- Retrieval System Models: What’s New?.- Slammer: An Urgent Wake-Up Call.- Caching Trust Rather Than Content.- Least Privilege and More.- Using Sharing to Simplify System Management.- An RSA-Related Number-Theoretic Surprise.- Application-Private Networks.- Using the CORAL System to Discover Attacks on Security Protocols.- On the Role of Binding and Rate Adaptation in Packet Networks.- Technologies for Portable Computing: Outlook and Limitations.- Multiple Alternative Voting.- The Semiotics of Umbrellas.- Computers for SpecializedApplication Areas.
Springer Book Archives
![]() |
Ask a Question About this Product More... |
![]() |