skip to main content
article
Free Access

End-to-end arguments in system design

Authors Info & Claims
Published:01 November 1984Publication History
First page image

References

  1. 1 BOLT BERANEK AND NEWMAN INC. Specifications for the interconnection of a host and an IMP. Tech. Rep. 1822. Bolt Beranek and Newman Inc. Cambridge, Mass. Dec. 1981.Google ScholarGoogle Scholar
  2. 2 BRANSTAD, D.K. Security aspects of computer networks. AAIA Paper 73-427, AIAA Computer Network Systems Conference, Huntsville, Ala. Apr. 1973.Google ScholarGoogle Scholar
  3. 3 CORBATO, F.J., DAGGETT, M.M., DALE~, R.C., CREASY, R.J., HELLIWIG, J.D., ORENSTEIN, R.H., AND KORN, L.K. The Compatible Time-Sharing System, A Programmer's Guide. Massachusetts institute of Technology Press, Cambridge, Mass. 1963, p. 10. Google ScholarGoogle Scholar
  4. 4 DIFFIE, W., AND HELLMAN, M.E. New directions in cryptography. IEEE Trans. Inf. Theory IT-22, 6 (Nov. 1976), 644-654.Google ScholarGoogle Scholar
  5. 5 GRAY, J.N. Notes on database operating systems. Operating Systems: An Advanced Course. Lecture Notes on Computer Science, vol. 60. Springer-Verlag, New York. 1978. 393-481. Google ScholarGoogle Scholar
  6. 6 GREENWALD, M. Remote virtual disk protocol specifications. Tech. Memo. Massachusetts institute ~)f Technology Laboratory for Computer Science, Cambridge, Mass. In preparation.Google ScholarGoogle Scholar
  7. 7 KEISTER, W., KETCHLEDGE, R.W., AND VAUGHAN, H.E. No. 1 ESS: System organization and objectives. Bell Syst. Tech. J. 53, 5, Pt 1, (Sept. 1964), 1841.Google ScholarGoogle Scholar
  8. 8 KENT, S.T. Encryption-based protection protocols for interactive user-computer communication. S.M. thesis, Dept. of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Mass., May 1976. Also available as Tech. Rep. TR-162. Massachusetts Institute of Technology Laboratory for Computer Science, May 1976. Google ScholarGoogle Scholar
  9. 9 LAMPSON, B.W., AND SPROULL, R.F. An open operating system for a single-user machine. In Proceedings of the 7th Symposium on Operating Systems Principles, (Pacific Grove, Calif. Dec. 10- 12). ACM, New York, 1979, pp. 98-105. Google ScholarGoogle Scholar
  10. 10 LAMPSON, B., AND STURGIS, H. Crash recovery in a distributed data storage system. Working paper, Xerox PARC, Palo Alto, Calif. Nov. 1976 and Apr. 1979. Submitted for publication.Google ScholarGoogle Scholar
  11. 11 NEEDHAM, R.M., AND SCHROEDER, M.D. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec. 1978), 993-999. Google ScholarGoogle Scholar
  12. 12 POPEK, G.J., et al. UCLA data secure unix. In Proceedings of the 1979 National Computer Conference, vol. AFIPS Press, Reston, Va., pp. 355-364.Google ScholarGoogle Scholar
  13. 13 REED, D.P. Implementing atomic actions on decentralized data. ACM Trans. Comput. Syst. 1, 1 (Feb. 1983), 3-23. Google ScholarGoogle Scholar
  14. 14 REED, D.P. Naming and synchronization in a decentralized computer system. Ph.D. dissertation, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, Cambridge, Mass. September 1978. Also available as Massachusetts Institute of Technology Laboratory for Computer Science Tech. Rep. TR-205, Sept., 1978. Google ScholarGoogle Scholar
  15. 15 REED, D.P., AND SVOBODOVA, L. SWALLOW. A distributed data storage system for a local network. A. West, and P. Janson, Eds. In Local Networks for Computer Communications, Proceedings of the IFIP Working Group 6.4 International Workshop on Local Networks (Zurich, Aug 27-29 1980), North-Holland, Amsterdam, 1981, pp. 355-373.Google ScholarGoogle Scholar
  16. 16 SCHROEDER, M.D., CLARK, D.D., AND SALTZER, J.H. The multics kernel design project. In Proceedings 6th Symposium on Operating Systems Principles. Oper. Syst. Rev. 11, 5 (Nov. 1977), 43-56. Google ScholarGoogle Scholar
  17. 17 STERN, J.A. Backup and recovery of on-line information in a computer utility. S.M. thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Mass. Aug. 1973. Available as Project MAC Tech. Rep. TR-116, Massachusetts Institute of Technology, Jan. 1974. Google ScholarGoogle Scholar

Index Terms

  1. End-to-end arguments in system design

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Computer Systems
          ACM Transactions on Computer Systems  Volume 2, Issue 4
          Nov. 1984
          83 pages
          ISSN:0734-2071
          EISSN:1557-7333
          DOI:10.1145/357401
          Issue’s Table of Contents

          Copyright © 1984 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 November 1984
          Published in tocs Volume 2, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader