skip to main content
10.1145/504450.504477acmconferencesArticle/Chapter ViewAbstractPublication PagesewConference Proceedingsconference-collections
Article
Free Access

The persistent relevance of the local operating system to global applications

Published:09 September 1996Publication History

ABSTRACT

The growth and popularity of loosely-coupled distributed systems such as the World Wide Web and the touting of Java-based systems as the solution to the issues of software maintenance, flexibility, and security are changing the research emphasis away from traditional single node operating system issues. Apparently, the view is that traditional OS issues are either solved problems or minor problems. By contrast, we believe that building such vast distributed systems upon the fragile infrastructure provided by today's operating systems is analogous to building castles on sand. In this paper we outline the supporting arguments for these views and describe an OS design that supports secure encapsulation of the foreign processes that will be increasingly prevalent in tomorrow's distributed systems.1

References

  1. 1.A. Adl-Tabatabai, G. Langdale, S. Lucco, and R. Wahbe. Efficient and Language-lndependent Mobile Programs. In Proc. ACM SIGPLAN Syrup. on Programming Language Design and Implementation, pages 127-136, May 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.S. M. Bellovin and M. Merritt. Limitations of the Kerberos Authentication System. In Proc. of the Winter 1991 USENIX Conference, pages 253-267, 1991.]]Google ScholarGoogle Scholar
  3. 3.A. Chankhunthod, P. B. Danzig, C, Neerdaels, M. E Schwartz, and K. J. Worrell. A Hierarchical Intemet Object Cache. In Proc. of the USENIX 1996 Technical Conference, pages 153-163, Jan. 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.D. R. Cheriton and K. J. Duda. A Caching Model of Operating System Kernel Functionality. In Proc. of the First Symp. on Operating Systems Design and Implementation, pages 179-193. USENIX Association, Nov. 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.D. Dean, E. W. Felten, and D. S. Wallach. Java Security: From HotJava to Netscape and Beyond. In Proc. of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.B. Ford and M. Hibler. Fluke: Flexible/J-kernel Environment-- Application Programming Interface Reference (draft). 121 pp. University of Utah. Available as ftp://mancos.cs.utah.edu/papers/sa-flukeref.ps.gz and http://www.cs.utah.edu/projects/- flux/fluke/html/sa-flukeref/(HTML format), 1996.]]Google ScholarGoogle Scholar
  7. 7.B. Ford, M. Hibler, and J. Lepreau. Using Annotated Interface Definitions to Optimize RPC. In Proc. of the 15th ACM Symposium on Operating Systems Principles, page 232, 1995. Poster.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.B. Ford, M. Hibler, J. Lepreau, P. Tullmann, G. Back, S. Goel, and S. Clawson. Microkemels Meet Recursive Virtual Machines. Technical Report UUCS-96-004, University of Utah, May 1996.]]Google ScholarGoogle Scholar
  9. 9.B. Ford and S. R. Susarla. Flexible Multi-Policy Scheduling based on CPU Inheritance. Technical Report UUCS-96-005, University of Utah, May 1996.]]Google ScholarGoogle Scholar
  10. 10.A. Gokhale and D. C. Schmidt. Measuring the Performance of Communication Middleware on High-Speed Networks. In SIGCOMM '96, San Francisco, CA, August 1996. ACM.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.R. P. Goldberg. Architecture of ViSual Machines. In AFIPS Conf Proc., June 1973.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.J. Gosling and H. McGilton. TheJavaLanguageEnvironment: A White Paper. Technicalreport, Sun Microsystems Computer Company, 1996. Available as http://java.sun.com/doc/language_environment.]]Google ScholarGoogle Scholar
  13. 13.N. Hardy. The KeyKos Architecture. Operating Systems Review, September 1985.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.M.B. Jones, P. J. Leach, R. P. Draves, and J. S. Barrera III. Modular Real-Time Resource Management in the Rialto Operating System. In Proc. Fifth Workshop on Hot Topics in Operating Systems, May 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.H. C. Lauer and D. Wyeth. A Recursive Virtual Machine Architecture. In ACM SIGARCH-S1GOPS Workshop on Virtual Computer Systems, pages 113-116, March 1973.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.J. Liedtke. On Micro-Kernel Construction. In Proc. of the 15th ACM Symposium on Operating Systems Principles, pages 237-250, Copper Mountain, CO, Dec. 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.J. Markoff. AT&T Plans to Offer Intemet Over a $500 Wireless Phone. New York Tunes. July 12, 1996.]]Google ScholarGoogle Scholar
  18. 18.J. C. Mogul. The Case for Persistent-Connection HTTP. In Proc. of the SIGCOMM '95 Conference, pages 299-313, Aug. 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.J. C. Mogul. Operating Systems Support for Busy Intemet Services. In Proc. Fifth Workshop on Hot Topics in Operating Systems, May 1995.]]Google ScholarGoogle ScholarCross RefCross Ref
  20. 20.J. C. Mogul. Hinted Caching in the Web. In Proc. of the Seventh A CM SIGOPS European Workshop, Sept. 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.D. Mosberger and L. L. Peterson. Making Paths Explicit in the Scout Operating System. Technical Report 96--05, University of Arizona, Dept. of Computer Science, May 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.G. J. Popek and C. Kline. Verifiable Secure Operating Systems Software. In AFIPS Conf. Proc., June 1973.]]Google ScholarGoogle Scholar
  23. 23.D. L Schmidt, T. Harrison, and E. AI-Shaer. Object-Oriented Components for High-Speed Networking Programming. In Proc. of the USENIX Conference Object-Oriented Technologies, June 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.D. Wagner, I. Goldberg, and R. Thomas. A Secure Environment for Untrusted Helper Applications. In Proc. of the 6th USENIX Unix Security Symposium, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.M. V. Wilkes and R. M. Needham. The Cambridge CAP Computer and its Operating System. North Holland, NY, 1979.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.F. Yellin. Low Level Security in Java. In Proc. 4th int'l Worm WMe Web Conference, pages 369-379, Dec. 1995.]]Google ScholarGoogle Scholar
  1. The persistent relevance of the local operating system to global applications

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          EW 7: Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
          September 1996
          326 pages
          ISBN:9781450373395
          DOI:10.1145/504450

          Copyright © 1996 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 September 1996

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate37of37submissions,100%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader