618
edits
[unchecked revision] | [unchecked revision] |
(5 intermediate revisions by 4 users not shown) | |||
Line 1:
Note that most of these links are to PDF files, some of which can be downloaded directly.
Line 15 ⟶ 14:
* 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [[http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9257 CiteSeer link page]]
* 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 [[http://academiccommons.columbia.edu/catalog/ac%3A189973 Academic Commons link page]]
* 'Speculative Execution as an Operating System Service' by Locasto and Keromytis, 2006 [[http://academiccommons.columbia.edu/catalog/ac%3A110558 Academic Commons link page]]
Line 40 ⟶ 38:
* 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [[http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9257 CiteSeer link page]]
* 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 [[http://academiccommons.columbia.edu/catalog/ac%3A189973 Academic Commons link page]]
== Distributed Systems ==
Line 49 ⟶ 46:
* 'Virtual Time and Global States of Distributed Systems', Mattern, 1988 [[http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.2620 CiteSeer link page]]
== Specific Implementation Techniques ==
* 'PCLSRing: Keeping Process State Modular', Bawden, 1989 (unpublished draft) [http://www.hack.org/mc/texts/pclsr.txt hack.org repository]
[[Category:Resources]]
|