Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
The Cambridge CAP computer and its operating system (Operating and programming systems series)January 1979
Publisher:
  • North-Holland Publishing Co.
  • Div. of Elsevier Science Publishers B.V. P.O. Box 211 1000 AE Amsterdam
  • Netherlands
ISBN:978-0-444-00357-7
Published:01 January 1979
Skip Bibliometrics Section
Reflects downloads up to 15 Oct 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Achermann R, Cock D, Haecki R, Hossle N, Humbel L, Roscoe T and Schwyn D mmapx Proceedings of the Workshop on Hot Topics in Operating Systems, (159-166)
  2. Lopriore L (2018). Access right management by extended password capabilities, International Journal of Information Security, 17:5, (603-612), Online publication date: 1-Oct-2018.
  3. ACM
    Woodruff J, Watson R, Chisnall D, Moore S, Anderson J, Davis B, Laurie B, Neumann P, Norton R and Roe M (2014). The CHERI capability model, ACM SIGARCH Computer Architecture News, 42:3, (457-468), Online publication date: 16-Oct-2014.
  4. Woodruff J, Watson R, Chisnall D, Moore S, Anderson J, Davis B, Laurie B, Neumann P, Norton R and Roe M The CHERI capability model Proceeding of the 41st annual international symposium on Computer architecuture, (457-468)
  5. ACM
    Kwon A, Dhawan U, Smith J, Knight T and DeHon A Low-fat pointers Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (721-732)
  6. ACM
    Drossopoulou S and Noble J The need for capability policies Proceedings of the 15th Workshop on Formal Techniques for Java-like Programs, (1-7)
  7. ACM
    Watson R, Anderson J, Laurie B and Kennaway K (2012). A taste of Capsicum, Communications of the ACM, 55:3, (97-104), Online publication date: 1-Mar-2012.
  8. ACM
    Kostiainen K, Reshetova E, Ekberg J and Asokan N Old, new, borrowed, blue -- Proceedings of the first ACM conference on Data and application security and privacy, (13-24)
  9. Denning P Virtual fault tolerance Dependable and Historic Computing, (251-260)
  10. ACM
    Murray D and Hand S Privilege separation made easy Proceedings of the 1st European Workshop on System Security, (40-46)
  11. ACM
    Tennenhouse D and Wetherall D (2007). Towards an active network architecture, ACM SIGCOMM Computer Communication Review, 37:5, (81-94), Online publication date: 20-Oct-2007.
  12. ACM
    Dillema F and Lupetti S Rendezvous-based access control for medical records in the pre-hospital environment Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments, (1-6)
  13. ACM
    Witchel E, Rhee J and Asanović K Mondrix Proceedings of the twentieth ACM symposium on Operating systems principles, (31-44)
  14. ACM
    Witchel E, Rhee J and Asanović K (2005). Mondrix, ACM SIGOPS Operating Systems Review, 39:5, (31-44), Online publication date: 20-Oct-2005.
  15. Krohn M, Efstathopoulos P, Frey C, Kaashoek F, Kohler E, Mazières D, Morris R, Osborne M, VanDeBogart S and Ziegler D Make least privilege a right (not a privilege) Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10, (21-21)
  16. ACM
    Spinellis D (2003). Reflections on trusting trust revisited, Communications of the ACM, 46:6, (112), Online publication date: 1-Jun-2003.
  17. Evered M Flexible enterprise access control with object-oriented view specification Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21, (17-24)
  18. Lopriore L (2002). Access Control Mechanisms in a Distributed, Persistent Memory System, IEEE Transactions on Parallel and Distributed Systems, 13:10, (1066-1083), Online publication date: 1-Oct-2002.
  19. Evered M Opsis Proceedings of the Fortieth International Conference on Tools Pacific: Objects for internet, mobile and embedded applications, (63-70)
  20. Evered M (2018). Bracket capabilities for distributed systems security, Australian Computer Science Communications, 24:1, (51-58), Online publication date: 1-Jan-2002.
  21. Evered M Bracket capabilities for distributed systems security Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4, (51-58)
  22. Shapiro J and Hardy N (2019). EROS, IEEE Software, 19:1, (26-33), Online publication date: 1-Jan-2002.
  23. Jaeger T Access control in configurable systems Secure Internet programming, (289-316)
  24. ACM
    Shapiro J, Smith J and Farber D (1999). EROS, ACM SIGOPS Operating Systems Review, 33:5, (170-185), Online publication date: 12-Dec-1999.
  25. ACM
    Shapiro J, Smith J and Farber D EROS Proceedings of the seventeenth ACM symposium on Operating systems principles, (170-185)
  26. ACM
    Gibson G, Nagle D, Amiri K, Butler J, Chang F, Gobioff H, Hardin C, Riedel E, Rochberg D and Zelenka J (1998). A cost-effective, high-bandwidth storage architecture, ACM SIGOPS Operating Systems Review, 32:5, (92-103), Online publication date: 1-Dec-1998.
  27. ACM
    Gibson G, Nagle D, Amiri K, Butler J, Chang F, Gobioff H, Hardin C, Riedel E, Rochberg D and Zelenka J (2019). A cost-effective, high-bandwidth storage architecture, ACM SIGPLAN Notices, 33:11, (92-103), Online publication date: 1-Nov-1998.
  28. ACM
    Gibson G, Nagle D, Amiri K, Butler J, Chang F, Gobioff H, Hardin C, Riedel E, Rochberg D and Zelenka J A cost-effective, high-bandwidth storage architecture Proceedings of the eighth international conference on Architectural support for programming languages and operating systems, (92-103)
  29. ACM
    Jaeger T, Liedtke J, Panteleenko V, Park Y and Islam N Security architecture for component-based operating systems Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications, (222-228)
  30. ACM
    Tullman P and Lepreau J Nested Java processes Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications, (111-117)
  31. ACM
    Lepreau J, Ford B and Hibler M The persistent relevance of the local operating system to global applications Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (133-140)
  32. Needham R (2018). Later Developments at Cambridge, IEEE Annals of the History of Computing, 14:4, (57-58), Online publication date: 1-Oct-1992.
  33. Ciminiera L and Valenzano A (2019). Authentication Mechanisms in Microprocessor-Based Local Area Networks, IEEE Transactions on Software Engineering, 15:5, (654-658), Online publication date: 1-May-1989.
  34. ACM
    Karger P Using registers to optimize cross-domain call performance Proceedings of the third international conference on Architectural support for programming languages and operating systems, (194-204)
  35. ACM
    Karger P (1989). Using registers to optimize cross-domain call performance, ACM SIGARCH Computer Architecture News, 17:2, (194-204), Online publication date: 1-Apr-1989.
  36. ACM
    Wilkes M (1986). Empiric, ACM SIGPLAN Notices, 21:8, (16-27), Online publication date: 1-Aug-1986.
  37. Gehringer E and Keedy J Tagged architecture Proceedings of the 12th annual international symposium on Computer architecture, (162-170)
  38. ACM
    Gehringer E and Keedy J (2019). Tagged architecture, ACM SIGARCH Computer Architecture News, 13:3, (162-170), Online publication date: 1-Jun-1985.
  39. ACM
    Richardson M and Needham R (1983). The TRIPOS filing machine, a front end to a file server, ACM SIGOPS Operating Systems Review, 17:5, (120-128), Online publication date: 31-Dec-1983.
  40. ACM
    Richardson M and Needham R The TRIPOS filing machine, a front end to a file server Proceedings of the ninth ACM symposium on Operating systems principles, (120-128)
  41. ACM
    Yudkin M Resource management in a distributed system Proceedings of the eighth symposium on Data communications, (221-226)
  42. ACM
    Yudkin M (1983). Resource management in a distributed system, ACM SIGCOMM Computer Communication Review, 13:4, (221-226), Online publication date: 1-Oct-1983.
  43. ACM
    Pollack F, Cox G, Hammerstrom D, Kahn K, Lai K and Rattner J (2019). Supporting ada memory management in the iAPX-432, ACM SIGPLAN Notices, 17:4, (117-131), Online publication date: 1-Apr-1982.
  44. ACM
    Wilkes M (2019). Hardware support for memory protection, ACM SIGPLAN Notices, 17:4, (107-116), Online publication date: 1-Apr-1982.
  45. ACM
    Mitchell J and Dion J (1982). A comparison of two network-based file servers, Communications of the ACM, 25:4, (233-245), Online publication date: 1-Apr-1982.
  46. ACM
    Pollack F, Cox G, Hammerstrom D, Kahn K, Lai K and Rattner J (1982). Supporting ada memory management in the iAPX-432, ACM SIGARCH Computer Architecture News, 10:2, (117-131), Online publication date: 1-Mar-1982.
  47. ACM
    Wilkes M (1982). Hardware support for memory protection, ACM SIGARCH Computer Architecture News, 10:2, (107-116), Online publication date: 1-Mar-1982.
  48. ACM
    Pollack F, Cox G, Hammerstrom D, Kahn K, Lai K and Rattner J Supporting ada memory management in the iAPX-432 Proceedings of the first international symposium on Architectural support for programming languages and operating systems, (117-131)
  49. ACM
    Wilkes M Hardware support for memory protection Proceedings of the first international symposium on Architectural support for programming languages and operating systems, (107-116)
  50. ACM
    Pollack F, Kahn K and Wilkinson R The iMAX-432 object filing system Proceedings of the eighth ACM symposium on Operating systems principles, (137-147)
  51. ACM
    Kahn K, Corwin W, Dennis T, D'Hooge H, Hubka D, Hutchins L, Montague J and Pollack F iMAX Proceedings of the eighth ACM symposium on Operating systems principles, (127-136)
  52. ACM
    Pollack F, Kahn K and Wilkinson R (1981). The iMAX-432 object filing system, ACM SIGOPS Operating Systems Review, 15:5, (137-147), Online publication date: 1-Dec-1981.
  53. ACM
    Kahn K, Corwin W, Dennis T, D'Hooge H, Hubka D, Hutchins L, Montague J and Pollack F (1981). iMAX, ACM SIGOPS Operating Systems Review, 15:5, (127-136), Online publication date: 1-Dec-1981.
  54. ACM
    Denning P (1981). ACM president's letter: computer architecture: some old ideas that haven't quite made it yet, Communications of the ACM, 24:9, (553-554), Online publication date: 1-Sep-1981.
  55. ACM
    Dellar C (1980). Removing backing store administration from the CAP operating system, ACM SIGOPS Operating Systems Review, 14:4, (41-49), Online publication date: 1-Oct-1980.
  56. ACM
    Dion J (1980). The Cambridge File Server, ACM SIGOPS Operating Systems Review, 14:4, (26-35), Online publication date: 1-Oct-1980.
  57. ACM
    Jones A (1980). Capability architecture revisited, ACM SIGOPS Operating Systems Review, 14:3, (33-35), Online publication date: 1-Jul-1980.
Contributors
  • University of Cambridge

Index Terms

  1. The Cambridge CAP computer and its operating system (Operating and programming systems series)

      Recommendations