ABSTRACT
The growth and popularity of loosely-coupled distributed systems such as the World Wide Web and the touting of Java-based systems as the solution to the issues of software maintenance, flexibility, and security are changing the research emphasis away from traditional single node operating system issues. Apparently, the view is that traditional OS issues are either solved problems or minor problems. By contrast, we believe that building such vast distributed systems upon the fragile infrastructure provided by today's operating systems is analogous to building castles on sand. In this paper we outline the supporting arguments for these views and describe an OS design that supports secure encapsulation of the foreign processes that will be increasingly prevalent in tomorrow's distributed systems.1
- 1.A. Adl-Tabatabai, G. Langdale, S. Lucco, and R. Wahbe. Efficient and Language-lndependent Mobile Programs. In Proc. ACM SIGPLAN Syrup. on Programming Language Design and Implementation, pages 127-136, May 1996.]] Google ScholarDigital Library
- 2.S. M. Bellovin and M. Merritt. Limitations of the Kerberos Authentication System. In Proc. of the Winter 1991 USENIX Conference, pages 253-267, 1991.]]Google Scholar
- 3.A. Chankhunthod, P. B. Danzig, C, Neerdaels, M. E Schwartz, and K. J. Worrell. A Hierarchical Intemet Object Cache. In Proc. of the USENIX 1996 Technical Conference, pages 153-163, Jan. 1996.]] Google ScholarDigital Library
- 4.D. R. Cheriton and K. J. Duda. A Caching Model of Operating System Kernel Functionality. In Proc. of the First Symp. on Operating Systems Design and Implementation, pages 179-193. USENIX Association, Nov. 1994.]] Google ScholarDigital Library
- 5.D. Dean, E. W. Felten, and D. S. Wallach. Java Security: From HotJava to Netscape and Beyond. In Proc. of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 1996.]] Google ScholarDigital Library
- 6.B. Ford and M. Hibler. Fluke: Flexible/J-kernel Environment-- Application Programming Interface Reference (draft). 121 pp. University of Utah. Available as ftp://mancos.cs.utah.edu/papers/sa-flukeref.ps.gz and http://www.cs.utah.edu/projects/- flux/fluke/html/sa-flukeref/(HTML format), 1996.]]Google Scholar
- 7.B. Ford, M. Hibler, and J. Lepreau. Using Annotated Interface Definitions to Optimize RPC. In Proc. of the 15th ACM Symposium on Operating Systems Principles, page 232, 1995. Poster.]] Google ScholarDigital Library
- 8.B. Ford, M. Hibler, J. Lepreau, P. Tullmann, G. Back, S. Goel, and S. Clawson. Microkemels Meet Recursive Virtual Machines. Technical Report UUCS-96-004, University of Utah, May 1996.]]Google Scholar
- 9.B. Ford and S. R. Susarla. Flexible Multi-Policy Scheduling based on CPU Inheritance. Technical Report UUCS-96-005, University of Utah, May 1996.]]Google Scholar
- 10.A. Gokhale and D. C. Schmidt. Measuring the Performance of Communication Middleware on High-Speed Networks. In SIGCOMM '96, San Francisco, CA, August 1996. ACM.]] Google ScholarDigital Library
- 11.R. P. Goldberg. Architecture of ViSual Machines. In AFIPS Conf Proc., June 1973.]] Google ScholarDigital Library
- 12.J. Gosling and H. McGilton. TheJavaLanguageEnvironment: A White Paper. Technicalreport, Sun Microsystems Computer Company, 1996. Available as http://java.sun.com/doc/language_environment.]]Google Scholar
- 13.N. Hardy. The KeyKos Architecture. Operating Systems Review, September 1985.]] Google ScholarDigital Library
- 14.M.B. Jones, P. J. Leach, R. P. Draves, and J. S. Barrera III. Modular Real-Time Resource Management in the Rialto Operating System. In Proc. Fifth Workshop on Hot Topics in Operating Systems, May 1995.]] Google ScholarDigital Library
- 15.H. C. Lauer and D. Wyeth. A Recursive Virtual Machine Architecture. In ACM SIGARCH-S1GOPS Workshop on Virtual Computer Systems, pages 113-116, March 1973.]] Google ScholarDigital Library
- 16.J. Liedtke. On Micro-Kernel Construction. In Proc. of the 15th ACM Symposium on Operating Systems Principles, pages 237-250, Copper Mountain, CO, Dec. 1995.]] Google ScholarDigital Library
- 17.J. Markoff. AT&T Plans to Offer Intemet Over a $500 Wireless Phone. New York Tunes. July 12, 1996.]]Google Scholar
- 18.J. C. Mogul. The Case for Persistent-Connection HTTP. In Proc. of the SIGCOMM '95 Conference, pages 299-313, Aug. 1995.]] Google ScholarDigital Library
- 19.J. C. Mogul. Operating Systems Support for Busy Intemet Services. In Proc. Fifth Workshop on Hot Topics in Operating Systems, May 1995.]]Google ScholarCross Ref
- 20.J. C. Mogul. Hinted Caching in the Web. In Proc. of the Seventh A CM SIGOPS European Workshop, Sept. 1996.]] Google ScholarDigital Library
- 21.D. Mosberger and L. L. Peterson. Making Paths Explicit in the Scout Operating System. Technical Report 96--05, University of Arizona, Dept. of Computer Science, May 1996.]] Google ScholarDigital Library
- 22.G. J. Popek and C. Kline. Verifiable Secure Operating Systems Software. In AFIPS Conf. Proc., June 1973.]]Google Scholar
- 23.D. L Schmidt, T. Harrison, and E. AI-Shaer. Object-Oriented Components for High-Speed Networking Programming. In Proc. of the USENIX Conference Object-Oriented Technologies, June 1995.]] Google ScholarDigital Library
- 24.D. Wagner, I. Goldberg, and R. Thomas. A Secure Environment for Untrusted Helper Applications. In Proc. of the 6th USENIX Unix Security Symposium, 1996.]] Google ScholarDigital Library
- 25.M. V. Wilkes and R. M. Needham. The Cambridge CAP Computer and its Operating System. North Holland, NY, 1979.]] Google ScholarDigital Library
- 26.F. Yellin. Low Level Security in Java. In Proc. 4th int'l Worm WMe Web Conference, pages 369-379, Dec. 1995.]]Google Scholar
- The persistent relevance of the local operating system to global applications
Recommendations
The Linux Operating System
The enormous consumer market for IBM PCs and compatibles has made them affordable. Now, with a free operating system called Linux, these inexpensive machines can be converted into powerful workstations for teaching, research, and software development. ...
Comments