skip to main content
article
Free access

End-to-end arguments in system design

Published: 01 November 1984 Publication History
First page of PDF

References

[1]
BOLT BERANEK AND NEWMAN INC. Specifications for the interconnection of a host and an IMP. Tech. Rep. 1822. Bolt Beranek and Newman Inc. Cambridge, Mass. Dec. 1981.
[2]
BRANSTAD, D.K. Security aspects of computer networks. AAIA Paper 73-427, AIAA Computer Network Systems Conference, Huntsville, Ala. Apr. 1973.
[3]
CORBATO, F.J., DAGGETT, M.M., DALE~, R.C., CREASY, R.J., HELLIWIG, J.D., ORENSTEIN, R.H., AND KORN, L.K. The Compatible Time-Sharing System, A Programmer's Guide. Massachusetts institute of Technology Press, Cambridge, Mass. 1963, p. 10.
[4]
DIFFIE, W., AND HELLMAN, M.E. New directions in cryptography. IEEE Trans. Inf. Theory IT-22, 6 (Nov. 1976), 644-654.
[5]
GRAY, J.N. Notes on database operating systems. Operating Systems: An Advanced Course. Lecture Notes on Computer Science, vol. 60. Springer-Verlag, New York. 1978. 393-481.
[6]
GREENWALD, M. Remote virtual disk protocol specifications. Tech. Memo. Massachusetts institute ~)f Technology Laboratory for Computer Science, Cambridge, Mass. In preparation.
[7]
KEISTER, W., KETCHLEDGE, R.W., AND VAUGHAN, H.E. No. 1 ESS: System organization and objectives. Bell Syst. Tech. J. 53, 5, Pt 1, (Sept. 1964), 1841.
[8]
KENT, S.T. Encryption-based protection protocols for interactive user-computer communication. S.M. thesis, Dept. of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Mass., May 1976. Also available as Tech. Rep. TR-162. Massachusetts Institute of Technology Laboratory for Computer Science, May 1976.
[9]
LAMPSON, B.W., AND SPROULL, R.F. An open operating system for a single-user machine. In Proceedings of the 7th Symposium on Operating Systems Principles, (Pacific Grove, Calif. Dec. 10- 12). ACM, New York, 1979, pp. 98-105.
[10]
LAMPSON, B., AND STURGIS, H. Crash recovery in a distributed data storage system. Working paper, Xerox PARC, Palo Alto, Calif. Nov. 1976 and Apr. 1979. Submitted for publication.
[11]
NEEDHAM, R.M., AND SCHROEDER, M.D. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec. 1978), 993-999.
[12]
POPEK, G.J., et al. UCLA data secure unix. In Proceedings of the 1979 National Computer Conference, vol. AFIPS Press, Reston, Va., pp. 355-364.
[13]
REED, D.P. Implementing atomic actions on decentralized data. ACM Trans. Comput. Syst. 1, 1 (Feb. 1983), 3-23.
[14]
REED, D.P. Naming and synchronization in a decentralized computer system. Ph.D. dissertation, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, Cambridge, Mass. September 1978. Also available as Massachusetts Institute of Technology Laboratory for Computer Science Tech. Rep. TR-205, Sept., 1978.
[15]
REED, D.P., AND SVOBODOVA, L. SWALLOW. A distributed data storage system for a local network. A. West, and P. Janson, Eds. In Local Networks for Computer Communications, Proceedings of the IFIP Working Group 6.4 International Workshop on Local Networks (Zurich, Aug 27-29 1980), North-Holland, Amsterdam, 1981, pp. 355-373.
[16]
SCHROEDER, M.D., CLARK, D.D., AND SALTZER, J.H. The multics kernel design project. In Proceedings 6th Symposium on Operating Systems Principles. Oper. Syst. Rev. 11, 5 (Nov. 1977), 43-56.
[17]
STERN, J.A. Backup and recovery of on-line information in a computer utility. S.M. thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Mass. Aug. 1973. Available as Project MAC Tech. Rep. TR-116, Massachusetts Institute of Technology, Jan. 1974.

Cited By

View all
  • (2024)Ambience: an operating system for IoT microservicesJournal of Edge Computing10.55056/jec.786Online publication date: 5-Sep-2024
  • (2024)Mobility–Multihoming DualityFuture Internet10.3390/fi1610035816:10(358)Online publication date: 1-Oct-2024
  • (2024)Understanding the Breakdown of Same-origin Policies in Web Services That Rehost WebsitesJournal of Information Processing10.2197/ipsjjip.32.80132(801-816)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Computer Systems
ACM Transactions on Computer Systems  Volume 2, Issue 4
Nov. 1984
83 pages
ISSN:0734-2071
EISSN:1557-7333
DOI:10.1145/357401
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 1984
Published in TOCS Volume 2, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data communication
  2. design principles
  3. protocol design

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2,792
  • Downloads (Last 6 weeks)315
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Ambience: an operating system for IoT microservicesJournal of Edge Computing10.55056/jec.786Online publication date: 5-Sep-2024
  • (2024)Mobility–Multihoming DualityFuture Internet10.3390/fi1610035816:10(358)Online publication date: 1-Oct-2024
  • (2024)Understanding the Breakdown of Same-origin Policies in Web Services That Rehost WebsitesJournal of Information Processing10.2197/ipsjjip.32.80132(801-816)Online publication date: 2024
  • (2024)Securing a Multiprocessor KVM Hypervisor with RustProceedings of the 2024 ACM Symposium on Cloud Computing10.1145/3698038.3698562(650-667)Online publication date: 20-Nov-2024
  • (2024)ConMonitor: Lightweight Container Protection with Virtualization and VM FunctionsProceedings of the 2024 ACM Symposium on Cloud Computing10.1145/3698038.3698520(755-773)Online publication date: 20-Nov-2024
  • (2024)Internet Architecture Evolution: Found in TranslationProceedings of the 23rd ACM Workshop on Hot Topics in Networks10.1145/3696348.3696876(300-307)Online publication date: 18-Nov-2024
  • (2024)An Architecture For Edge Networking ServicesProceedings of the ACM SIGCOMM 2024 Conference10.1145/3651890.3672261(645-660)Online publication date: 4-Aug-2024
  • (2024)Designing, Constructing, and Operating an IPv6 Network at SC23: A case study in implementing the IPv6 protocol on a heterogenous network that supports the SC23 conferencePractice and Experience in Advanced Research Computing 2024: Human Powered Computing10.1145/3626203.3670531(1-8)Online publication date: 17-Jul-2024
  • (2024)Mental Models, Expectations and Implications of Client-Side Scanning: An Interview Study with ExpertsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642310(1-24)Online publication date: 11-May-2024
  • (2024)Katoptron: Efficient State Mirroring for Middlebox ResilienceNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575815(1-9)Online publication date: 6-May-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media