Academic Papers: Difference between revisions
Jump to navigation
Jump to search
[unchecked revision] | [unchecked revision] |
Content added Content deleted
Glauxosdever (talk | contribs) (Fix formatting) |
|||
(4 intermediate revisions by 3 users not shown) | |||
Line 14: | Line 14: | ||
* 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [[http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9257 CiteSeer link page]] |
* 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [[http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9257 CiteSeer link page]] |
||
* 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 |
* 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 [[http://academiccommons.columbia.edu/catalog/ac%3A189973 Academic Commons link page]] |
||
[[http://academiccommons.columbia.edu/catalog/ac%3A189973 Academic Commons link page]] |
|||
* 'Speculative Execution as an Operating System Service' by Locasto and Keromytis, 2006 [[http://academiccommons.columbia.edu/catalog/ac%3A110558 Academic Commons link page]] |
* 'Speculative Execution as an Operating System Service' by Locasto and Keromytis, 2006 [[http://academiccommons.columbia.edu/catalog/ac%3A110558 Academic Commons link page]] |
||
Line 39: | Line 38: | ||
* 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [[http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9257 CiteSeer link page]] |
* 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [[http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.9257 CiteSeer link page]] |
||
* 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 |
* 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 [[http://academiccommons.columbia.edu/catalog/ac%3A189973 Academic Commons link page]] |
||
[[http://academiccommons.columbia.edu/catalog/ac%3A189973 Academic Commons link page]] |
|||
== Distributed Systems == |
== Distributed Systems == |
||
Line 51: | Line 49: | ||
== Specific Implementation Techniques == |
== Specific Implementation Techniques == |
||
* 'PCLSRing: Keeping Process State Modular', Bawden, 1989 (unpublished draft) [http://www.hack.org/mc/texts/pclsr.txt hack.org repository] |
* 'PCLSRing: Keeping Process State Modular', Bawden, 1989 (unpublished draft) [http://www.hack.org/mc/texts/pclsr.txt hack.org repository] |
||
[[Category:Resources]] |
Latest revision as of 17:23, 6 June 2024
Note that most of these links are to PDF files, some of which can be downloaded directly.
Kernel Design
- 'The Case for Crypto Protocol Awareness in the Kernel' by Burnside and Keromytis, 2006 [Academic Commons link page]
- 'Exokernel: An Operating System Architecture for Application-Level Resource Management', by Engler, Kaashoek and O’Toole, 1995 [CiteSeer link page]
- 'Improving IPC by Kernel Design' by Liedtke, 1993 [Yale PDF]
- 'Operating System Virtualization: Practice and Experience' by Laadan and Nieh, 2008 [Academic Commons link page]
- 'An Overview of the Synthesis Operating System' by Pu and Massalin, 1989 [Academic Commons link page]
- 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [CiteSeer link page]
- 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 [Academic Commons link page]
- 'Speculative Execution as an Operating System Service' by Locasto and Keromytis, 2006 [Academic Commons link page]
- 'Synthesis: An Efficient Implementation of Fundamental Operating System Services' by Massalin, 1992 [CiteSeer PDF] [Valerie Aurora HTML]
- 'The Synthesis Kernel' by Pu, Massalin, and Ioannidis, 1987 [USENIX PDF]
- 'Threads and Input/Output in the Synthesis Kernel', by Pu and Massalin, 1989 [Princeton PDF]
File System Design
- 'ChunkFS' by Aurora, 2006 [usenix.org PDF] [usenix.org HTML] [Valerie Aurora PDF]
- 'Improving File System Reliability and Availability with Continuous Checker and Repair' by Gunawi, 2011 [UC Berkeley PDF]
- 'Repair-Driven File System Design' by Aurora, 2006 [Valerie Aurora PDF]
- 'Using Declarative Invariants for Protecting File-System Integrity' Sun, et. al., 2006 [SIGOPS PDF]
Security
- 'Bro: A System for Detecting Network Intruders in Real-Time' by Paxson, 1999 [CiteSeer link page]
- 'The Protection of Information in Computer Systems' by Saltzer and Schroeder, 1975 [CiteSeer link page]
- 'Protecting Commodity Operating Systems through Strong Kernel Isolation' by Kemerlis, 2015 [Academic Commons link page]
Distributed Systems
- 'An Integrated Experimental Environment for Distributed Systems and Networks', by White et. al., 2002 [CiteSeer link page]
- 'Unreliable Failure Detectors for Reliable Distributed Systems' by Chandra and Toueg, 1996 [CiteSeer link page]
- 'Virtual Time and Global States of Distributed Systems', Mattern, 1988 [CiteSeer link page]
Specific Implementation Techniques
- 'PCLSRing: Keeping Process State Modular', Bawden, 1989 (unpublished draft) hack.org repository