Scale and performance in the Denali isolation kernel
暂无分享,去创建一个
Marianne Shaw | Steven D. Gribble | Andrew Whitaker | S. Gribble | A. Whitaker | M. Shaw | Andrew Whitaker | Marianne Shaw
[1] Robert P. Goldberg,et al. Architectural Principles for Virtual Computer Systems , 1973 .
[2] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[3] John L. Hennessy,et al. WSCLOCK—a simple and effective algorithm for virtual memory management , 1981, SOSP.
[4] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.
[5] Robert J. Creasy,et al. The Origin of the VM/370 Time-Sharing System , 1981, IBM J. Res. Dev..
[6] William J. Bolosky,et al. Mach: A New Kernel Foundation for UNIX Development , 1986, USENIX Summer.
[7] Brian N. Bershad,et al. Using continuations to implement thread management and communication in operating systems , 1991, SOSP '91.
[8] Brian N. Bershad,et al. An I/O System for Mach 3.0 , 1991, USENIX MACH Symposium.
[9] Mary Ellen Zurko,et al. A Retrospective on the VAX VMM Security Kernel , 1991, IEEE Trans. Software Eng..
[10] Mike Hibler,et al. The persistent relevance of the local operating system to global applications , 1996, EW 7.
[11] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[12] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[13] Robin Fairbairns,et al. The Design and Implementation of an Operating System to Support Distributed Multimedia Applications , 1996, IEEE J. Sel. Areas Commun..
[14] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[15] Mike Hibler,et al. Microkernels meet recursive virtual machines , 1996, OSDI '96.
[16] Peter Druschel,et al. Lazy receiver processing (LRP): a network subsystem architecture for server systems , 1996, OSDI '96.
[17] Scott Devine,et al. Disco: running commodity operating systems on scalable multiprocessors , 1997, TOCS.
[18] Jay Lepreau,et al. The Flux OSKit: a substrate for kernel and language research , 1997, SOSP.
[19] Dan S. Wallach,et al. Extensible security architectures for Java , 1997, SOSP.
[20] Robert Grimm,et al. Application performance and flexibility on exokernel systems , 1997, SOSP.
[21] Vern Paxson,et al. An architecture for large-scale Internet measurement , 1998, IEEE Commun. Mag..
[22] Li Fan,et al. Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[23] Peter Druschel,et al. Resource containers: a new facility for resource management in server systems , 1999, OSDI '99.
[24] Alec Wolman,et al. Organization-Based Analysis of Web-Object Sharing and Caching , 1999, USENIX Symposium on Internet Technologies and Systems.
[25] Daniel R. Simon,et al. WindowBox: a simple security model for the connected desktop , 2000 .
[26] Kang G. Shin,et al. Virtual Services: A New Abstraction for Server Consolidation , 2000, USENIX Annual Technical Conference, General Track.
[27] Cynthia E. Irvine,et al. Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor , 2000, USENIX Security Symposium.
[28] Stefan Savage,et al. Alpine: A User-Level Infrastructure for Network Protocol Development , 2001, USITS.
[29] Junfeng Yang,et al. An empirical study of operating systems errors , 2001, SOSP.
[30] Beng-Hong Lim,et al. Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.
[31] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[32] Michael M. Swift,et al. Improving the granularity of access control in Windows NT , 2001, SACMAT '01.
[33] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..