Check out the new USENIX Web site. [Next] [Up] [Previous]
Next: About this document ... Up: Scale and Performance in Previous: Acknowledgments

Bibliography

1
M. Accetta et al.
Mach: A new kernel foundation for UNIX development.
In Proceedings of the USENIX Summer Conference, 1986.

2
Collaborative advanced interagency research network (cairn).
https://www.cairn.net, 1997.

3
D. Balfanz and D.R. Simon.
Windowbox: A simple security model for the connected desktop.
In Proceedings of the 4th USENIX Windows Systems Symposium, August 2000.

4
G. Banga, P. Druschel, and J.C. Mogul.
Resource containers: a new facility for resource management in server systems.
In Proceedings of the 3rd USENIX Symposium on Operating system design and implementation, February 1999.

5
L. Breslau et al.
Web caching, and Zipf-like distributions: Evidence, and implications, Mar 1999.

6
E. Bugnion, S. Devine, and M. Rosenblum.
Disco: running commodity operating systems on scalable multiprocessors.
In Proceedings of the Sixteenth ACM Symposium on Operating System Principles, October 1997.

7
R. Carr and J. Hennessy.
WSCLOCK: a simple and effective algorithm for virtual memory management.
In Proceedings of the 8th Symposium on Operating System Principles, Dec 1981.

8
A. Chou et al.
An Empirical Study of Operating System Errors.
In Proceedings of the 18th ACM Symposium on Operating System Principles (SOSP '01), October 2001.

9
R.J. Creasy.
The origin of the VM/370 time-sharing system.
IBM Journal of Research and Development, 25(5), 1981.

10
R.P. Draves, B.N. Bershad, R.F. Rashid, and R.W. Dean.
Using continuations to implement thread management and communication in operating systems.
In Proceedings of the 13th ACM Symposium on Operating Systems Principles, Pacific Grove, CA, USA, October 1991.

11
P. Druschel and G. Banga.
Lazy receiver processing: A network subsystem architecture for server systems.
In Proceedings of the Second Symposium on Operating Systems Design and Implementation, Seattle, WA, USA, Oct 1996.

12
D. Ely, S. Savage, and D. Wetherall.
Alpine: A user-level infrastructure for network protocol development.
In Proceedings of the Third USENIX Symposium on Internet Technologies and Systems (USITS '01), March, 2001.

13
B. Ford et al.
Microkernels meet recursive virtual machines.
In Proceedings of the Second Symposium on Operating Systems Design and Implementation, October 1996.

14
B. Ford et al.
The Flux OSKit: A substrate for kernel and language research.
In Proceedings of the 16th ACM Symposium on Operating Systems Principles, St.-Malo, France, October 1997.

15
A.F. Forin, D.B. Golub, and B.N. Bershad.
An I/O system for Mach.
In Proceedings of the Usenix Mach Symposium (MACHNIX), Nov 1991.

16
I. Goldberg, D. Wagner, R. Thomas, and E.A. Brewer.
A secure environment for untrusted helper applications.
In Proceedings of the sixth USENIX Security Symposium, July 1996.

17
R.P. Goldberg.
Architectural Principles for Virtual Computer Systems.
PhD thesis, Harvard University, 1972.

18
D. Gollmann.
Computer Security.
John Wiley and Son, Ltd., 1st edition, February 1999.

19
Robert S. Gray.
Agent Tcl: A Flexible and Secure Mobile-Agent System.
In Proceedings of the Fourth Annual Usenix Tcl/Tk Workshop, 1996.

20
M.F. Kaashoek et al.
Application performance and flexibility on exokernel systems.
In Proceedings of the Sixteenth ACM Symposium on Operating System Principles, October 1997.

21
P.A. Karger et al.
A retrospective on the VAX VMM security kernel.
17(11), November 1991.

22
J. Lepreau, B. Ford, and M. Hibler.
The persistant relevance of the local operating system to global applications.
In Proceedings of the Seventh SIGOPS European Workshop, Sep 1996.

23
I. Leslie et al.
The design and implementation of an operating system to support distributed multimedia applications.
IEEE Journal of Selected Areas in Communications, 14(7), 1996.

24
R. Meushaw and D. Simard.
NetTop: Commercial technology in high assurance applications.
https://www.vmware.com/, 2000.

25
V. Paxson, J. Mahdavi, A. Adams, and M. Mathis.
An architecture for large-scale Internet measurement.
IEEE Communications Magazine, 36(8):48-54, August 1998.

26
J. Reumann et al.
Virtual services: A new abstraction for server consolidation.
In Proceedings of the 2000 USENIX Annual Technical Conference, San Diego, USA, June 2000.

27
J.S. Robin and C.E. Irvine.
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor.
In Proceedings of the 9th USENIX Security Symposium, Denver, CO, August 2000.

28
J. Rushby.
Design and verification of secure systems.
In Proceedings of the 8th Symposium on Operating System Principles, December 1981.

29
J.H. Saltzer and M.D. Schroeder.
The protection of information in computer systems.
Proceedings of the IEEE, 63(9), 1975.

30
I. Stoica et al.
Chord: A scalable content-addressable network.
In Proceedings of ACM SIGCOMM 2001, San Diego, USA, Aug 2001.

31
J. Sugerman, G. Venkitachalam, and B. Lim.
Virtualizing I/O devices on VMware workstation's hosted virtual machine monitor.
In Proceedings of the 2001 Annual Usenix Technical Conference, Boston, MA, USA, June 2001.

32
M.M. Swift et al.
Improving the granularity of access control in Windows NT.
In Proceedings of the 6th ACM Symposium On Access Control Models and Technologies, May 2001.

33
D.S. Wallach et al.
Extensible security architectures for Java.
In Proceedings of the Sixteenth ACM Symposium on Operating System Principles, Oct 1997.

34
A. Wolman et al.
Organization-based analysis of web-object sharing and caching.
In Proceedings of the 2nd USENIX Conference on Internet Technologies and Systems (USITS '99), Boulder, CO, Oct 1999.



Andrew Whitaker 2002-10-07