The persistent relevance of the local operating system to global applications

The growth and popularity of loosely-coupled distributed systems such as the World Wide Web and the touting of Java-based systems as the solution to the issues of software maintenance, flexibility, and security are changing the research emphasis away from traditional single node operating system issues. Apparently, the view is that traditional OS issues are either solved problems or minor problems. By contrast, we believe that building such vast distributed systems upon the fragile infrastructure provided by today's operating systems is analogous to building castles on sand. In this paper we outline the supporting arguments for these views and describe an OS design that supports secure encapsulation of the foreign processes that will be increasingly prevalent in tomorrow's distributed systems.1

[1]  Gerald J. Popek,et al.  Verifiable secure operating system software , 1974, AFIPS '74.

[2]  Larry L. Peterson,et al.  Making paths explicit in the Scout operating system , 1996, OSDI '96.

[3]  Mike Hibler,et al.  Microkernels meet recursive virtual machines , 1996, OSDI '96.

[4]  Hugh C. Lauer,et al.  A recursive virtual machine architecture , 1973 .

[5]  David A. Wagner,et al.  A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.

[6]  Michael B. Jones,et al.  Modular real-time resource management in the Rialto operating system , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).

[7]  B. Ford,et al.  UUCS-96-005 Flexible Multi-Policy Scheduling based on CPU Inheritance , 1996 .

[8]  James A. Gosling,et al.  The java language environment: a white paper , 1995 .

[9]  Douglas C. Schmidt,et al.  Object-Oriented Components for High-speed Network Programming , 1995, COOTS.

[10]  LepreauJay,et al.  Microkernels meet recursive virtual machines , 1996 .

[11]  Steven M. Bellovin,et al.  Limitations of the Kerberos authentication system , 1990, CCRV.

[12]  Peter B. Danzig,et al.  A Hierarchical Internet Object Cache , 1996, USENIX ATC.

[13]  Jeffrey C. Mogul,et al.  Operating systems support for busy Internet servers , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).

[14]  Maurice V. Wilkes,et al.  The Cambridge CAP computer and its operating system (Operating and programming systems series) , 1979 .

[15]  David R. Cheriton,et al.  A caching model of operating system kernel functionality , 1994, OSDI '94.

[16]  Jeffrey C. Mogul,et al.  Hinted caching in the web , 1996, EW 7.

[17]  Jochen Liedtke,et al.  On micro-kernel construction , 1995, SOSP.

[18]  Norman Hardy,et al.  KeyKOS architecture , 1985, OPSR.

[19]  Jeffrey C. Mogul,et al.  The case for persistent-connection HTTP , 1995, SIGCOMM '95.

[20]  Aniruddha S. Gokhale,et al.  Measuring the Performance of Communication Middleware on High-Speed Networks , 1996, SIGCOMM.

[21]  Mike Hibler,et al.  Using annotated interface definitions to optimize RPC , 1995, SOSP.

[22]  Dan S. Wallach,et al.  Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[23]  Frank Yellin,et al.  Low Level Security in Java , 1995, WWW.

[24]  Robert Wahbe,et al.  Efficient and language-independent mobile programs , 1996, PLDI '96.

[25]  Ian Goldberg,et al.  A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .