首页 > 最新文献

Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)最新文献

英文 中文
Security for extensible systems 可扩展系统的安全性
R. Grimm, B. Bershad
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on overall system security and, specifically, on access control is still ill understood, and protection mechanisms in these extensible systems are rudimentary at best. We identify the structure of extensible systems as it relates to system security and postulate an initial model for access control. This model extends the discretionary access control of traditional operating systems to encompass extensions and, by using ideas explored by the security community, introduces a notion of mandatory access control. While a new access control model does not address all aspects of system security, we believe that it can serve as a solid foundation for developing a fully featured and flexible security model for extensible systems.
动态扩展系统(如Java、SPIN或VINO)的最新趋势预示着更强大和灵活的系统。与此同时,可扩展性对整个系统安全性的影响,特别是对访问控制的影响,仍然没有得到很好的理解,这些可扩展系统中的保护机制充其量只是初级的。我们确定了可扩展系统的结构,因为它与系统安全有关,并假设了访问控制的初始模型。该模型扩展了传统操作系统的自由访问控制,以包含扩展,并且通过使用安全社区探索的思想,引入了强制访问控制的概念。虽然新的访问控制模型不能解决系统安全的所有方面,但我们相信它可以作为为可扩展系统开发功能齐全且灵活的安全模型的坚实基础。
{"title":"Security for extensible systems","authors":"R. Grimm, B. Bershad","doi":"10.1109/HOTOS.1997.595184","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595184","url":null,"abstract":"The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on overall system security and, specifically, on access control is still ill understood, and protection mechanisms in these extensible systems are rudimentary at best. We identify the structure of extensible systems as it relates to system security and postulate an initial model for access control. This model extends the discretionary access control of traditional operating systems to encompass extensions and, by using ideas explored by the security community, introduces a notion of mandatory access control. While a new access control model does not address all aspects of system security, we believe that it can serve as a solid foundation for developing a fully featured and flexible security model for extensible systems.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"431 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115613039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Query routing: applying systems thinking to Internet search 查询路由:系统思维在互联网搜索中的应用
Paul J Leach, C. Weider
As the Internet continues to grow exponentially, locating desired information becomes more difficult. Centralized approaches to the problem may prove unable to cope with this growth, and existing distributed ones do not scale well either, so it would be wise to investigate alternatives. One alternative is 'query routing', a technology which uses compressed indices from multiple sites to 'route' queries to where they may be able to be fulfilled. By using a referral model for the clients, it should be possible to provide a service which scales for both clients and servers. Server scaling is achieved by index compression along several novel axes. Allowing the generation of false positives permits the use of techniques which have higher compression. We have been able to add techniques from distributed naming systems such as DNS to traditional indexing based on flat sets of attribute value pairs. We have implemented a prototype that incorporates several of these techniques.
随着因特网继续呈指数级增长,查找所需信息变得更加困难。集中解决问题的方法可能无法应对这种增长,现有的分布式方法也不能很好地扩展,因此研究替代方案是明智的。另一种选择是“查询路由”,这种技术使用来自多个站点的压缩索引将查询“路由”到它们可能能够实现的地方。通过为客户端使用推荐模型,应该可以为客户端和服务器提供可扩展的服务。服务器扩展是通过沿着几个新轴的索引压缩来实现的。允许假阳性的产生允许使用具有更高压缩的技术。我们已经能够将分布式命名系统(如DNS)中的技术添加到基于平面属性值对集的传统索引中。我们已经实现了一个包含了其中几种技术的原型。
{"title":"Query routing: applying systems thinking to Internet search","authors":"Paul J Leach, C. Weider","doi":"10.1109/HOTOS.1997.595187","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595187","url":null,"abstract":"As the Internet continues to grow exponentially, locating desired information becomes more difficult. Centralized approaches to the problem may prove unable to cope with this growth, and existing distributed ones do not scale well either, so it would be wise to investigate alternatives. One alternative is 'query routing', a technology which uses compressed indices from multiple sites to 'route' queries to where they may be able to be fulfilled. By using a referral model for the clients, it should be possible to provide a service which scales for both clients and servers. Server scaling is achieved by index compression along several novel axes. Allowing the generation of false positives permits the use of techniques which have higher compression. We have been able to add techniques from distributed naming systems such as DNS to traditional indexing based on flat sets of attribute value pairs. We have implemented a prototype that incorporates several of these techniques.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The failure of personalities to generalize 人格不能概括
B. Fleisch
IBM's adoption of operating system personalities was one of the most publicized issues in operating systems design. The basic premise of Workplace OS work was: (1) IBM would adopt and improve the CMU Mach 3.0 microkernel for use on PDAs, the desktop and massively parallel machines, and (2) that several operating system personalities would execute on the microkernel platform concurrently. This architecture would provide users with the best worlds as they switch between applications written for different operating systems. IBM would also benefit from significant cost savings by having one common platform for all product lines. IBM's plans for use of the microkernel and multiple-personalities, as a unifying mechanism for a widely diverse set of hardware products, have failed. We examine why IBM's microkernel and multipersonality system was not successful from a technical and business standpoint. We also discuss Power Personal systems, which were introduced during these radical software changes and then later abandoned.
IBM对操作系统个性的采用是操作系统设计中最广为人知的问题之一。Workplace OS工作的基本前提是:(1)IBM将采用并改进用于pda、桌面和大规模并行机的CMU Mach 3.0微内核;(2)多个操作系统个性将并发地在微内核平台上执行。当用户在为不同操作系统编写的应用程序之间切换时,这种体系结构将为他们提供最好的体验。通过为所有产品线提供一个通用平台,IBM还将受益于显著的成本节约。IBM计划使用微内核和多重人格,作为一种广泛多样的硬件产品的统一机制,但这一计划失败了。我们将从技术和业务的角度分析IBM的微内核和多人格系统不成功的原因。我们还讨论了Power Personal系统,它是在这些激进的软件变革期间引入的,后来被抛弃了。
{"title":"The failure of personalities to generalize","authors":"B. Fleisch","doi":"10.1109/HOTOS.1997.595174","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595174","url":null,"abstract":"IBM's adoption of operating system personalities was one of the most publicized issues in operating systems design. The basic premise of Workplace OS work was: (1) IBM would adopt and improve the CMU Mach 3.0 microkernel for use on PDAs, the desktop and massively parallel machines, and (2) that several operating system personalities would execute on the microkernel platform concurrently. This architecture would provide users with the best worlds as they switch between applications written for different operating systems. IBM would also benefit from significant cost savings by having one common platform for all product lines. IBM's plans for use of the microkernel and multiple-personalities, as a unifying mechanism for a widely diverse set of hardware products, have failed. We examine why IBM's microkernel and multipersonality system was not successful from a technical and business standpoint. We also discuss Power Personal systems, which were introduced during these radical software changes and then later abandoned.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123363085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Formal methods: a practical tool for OS implementors 形式化方法:操作系统实现者的实用工具
Patrick Tullmann, J. Turner, J. McCorquodale, Jay Lepreau, Ajaya Chitturi, Godmar Back
The formal methods community has long known about the need to formally analyze concurrent software, but the operating systems (OS) community has been slow to adopt such methods. The foremost reasons for this are the cultural and knowledge gaps between formalists and OS hackers, fostered by three beliefs: inaccessibility of the tools, the disabling gap between the validated model and actual implementation, and the intractable size of OSs. In this paper, we show these beliefs to be untrue for appropriately structured OSs. We applied formal methods to verify properties of the implementation of the Fluke microkernel's IPC (interprocess communication) subsystem, a major component of the kernel. In particular, we have verified, in many scenarios, certain liveness properties and lack of deadlock, with results that apply to both SMP (scalable multiprocessor) and uniprocessor environments. The SPIN model checker provided an exhaustive concurrency analysis of the IPC subsystem, unattainable through traditional OS testing methods. SPIN is easily accessible to programmers inexperienced with formal methods. We present our results as a starting point for a more comprehensive inclusion of formal methods in practical OS development.
形式化方法社区早就知道需要形式化地分析并发软件,但是操作系统(OS)社区在采用这种方法方面进展缓慢。最重要的原因是形式主义者和操作系统黑客之间的文化和知识差距,这是由三个信念造成的:工具的不可访问性,验证模型和实际实现之间的残疾差距,以及操作系统难以处理的规模。在本文中,我们证明了这些信念对于适当结构的操作系统是不真实的。我们应用形式化方法来验证Fluke微内核的IPC(进程间通信)子系统(内核的主要组成部分)实现的属性。特别是,我们已经在许多场景中验证了某些活动属性和缺乏死锁,其结果适用于SMP(可扩展的多处理器)和单处理器环境。SPIN模型检查器为IPC子系统提供了详尽的并发性分析,这是通过传统的操作系统测试方法无法实现的。对于没有正式方法经验的程序员来说,SPIN很容易理解。我们将我们的结果作为一个起点,在实际的操作系统开发中更全面地包含形式化方法。
{"title":"Formal methods: a practical tool for OS implementors","authors":"Patrick Tullmann, J. Turner, J. McCorquodale, Jay Lepreau, Ajaya Chitturi, Godmar Back","doi":"10.1109/HOTOS.1997.595176","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595176","url":null,"abstract":"The formal methods community has long known about the need to formally analyze concurrent software, but the operating systems (OS) community has been slow to adopt such methods. The foremost reasons for this are the cultural and knowledge gaps between formalists and OS hackers, fostered by three beliefs: inaccessibility of the tools, the disabling gap between the validated model and actual implementation, and the intractable size of OSs. In this paper, we show these beliefs to be untrue for appropriately structured OSs. We applied formal methods to verify properties of the implementation of the Fluke microkernel's IPC (interprocess communication) subsystem, a major component of the kernel. In particular, we have verified, in many scenarios, certain liveness properties and lack of deadlock, with results that apply to both SMP (scalable multiprocessor) and uniprocessor environments. The SPIN model checker provided an exhaustive concurrency analysis of the IPC subsystem, unattainable through traditional OS testing methods. SPIN is easily accessible to programmers inexperienced with formal methods. We present our results as a starting point for a more comprehensive inclusion of formal methods in practical OS development.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134266677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Customization lite [operating systems] 定制生活[操作系统]
M. Auslander, H. Franke, Benjamin Gamsa, O. Krieger, M. Stumm
There has been a great deal of interest in recent years in developing operating systems that can be customized to meet the performance and functionality needs of particular applications while being extensible to support new policies, new implementations and new interfaces. We describe a structuring technique, called building-block composition, that we are employing for this purpose. The customizability that this technique provides to untrusted applications is, while large, less than that provided by some other techniques. However, it results in a more extensible and maintainable system, is easier for untrusted applications to use, and provides a better foundation for overall improved performance, particularly for multiprocessors.
近年来,人们对开发可以定制以满足特定应用程序的性能和功能需求,同时可扩展以支持新策略、新实现和新接口的操作系统非常感兴趣。我们描述了一种结构化技术,称为构建块组合,我们正在使用它来实现这个目的。该技术为不受信任的应用程序提供的可定制性虽然很大,但比其他一些技术提供的可定制性要小。但是,它产生了一个更具可扩展性和可维护性的系统,对于不受信任的应用程序来说更容易使用,并且为总体性能改进提供了更好的基础,特别是对于多处理器。
{"title":"Customization lite [operating systems]","authors":"M. Auslander, H. Franke, Benjamin Gamsa, O. Krieger, M. Stumm","doi":"10.1109/HOTOS.1997.595180","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595180","url":null,"abstract":"There has been a great deal of interest in recent years in developing operating systems that can be customized to meet the performance and functionality needs of particular applications while being extensible to support new policies, new implementations and new interfaces. We describe a structuring technique, called building-block composition, that we are employing for this purpose. The customizability that this technique provides to untrusted applications is, while large, less than that provided by some other techniques. However, it results in a more extensible and maintainable system, is easier for untrusted applications to use, and provides a better foundation for overall improved performance, particularly for multiprocessors.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Building diverse computer systems 构建多样化的计算机系统
S. Forrest, Anil Somayaji, D. Ackley
Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advantages, the beneficial effects of diversity in computing systems have been overlooked, specifically in the area of computer security. Several methods of achieving software diversity are discussed based on randomizations that respect the specified behavior of the program. Such randomization could potentially increase the robustness of software systems with minimal impact on convenience, usability, and efficiency. Randomization of the amount of memory allocated on a stack frame is shown to disrupt a simple buffer overflow attack.
多样性是生物系统鲁棒性的重要来源。相比之下,计算机以缺乏多样性而闻名。尽管同构系统有许多优点,但计算系统多样性的有益影响一直被忽视,特别是在计算机安全领域。基于尊重程序的特定行为的随机化,讨论了实现软件多样性的几种方法。这种随机化可以潜在地增加软件系统的健壮性,同时对便利性、可用性和效率的影响最小。在堆栈帧上分配的内存量的随机化可以破坏简单的缓冲区溢出攻击。
{"title":"Building diverse computer systems","authors":"S. Forrest, Anil Somayaji, D. Ackley","doi":"10.1109/HOTOS.1997.595185","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595185","url":null,"abstract":"Diversity is an important source of robustness in biological systems. Computers, by contrast, are notable for their lack of diversity. Although homogeneous systems have many advantages, the beneficial effects of diversity in computing systems have been overlooked, specifically in the area of computer security. Several methods of achieving software diversity are discussed based on randomizations that respect the specified behavior of the program. Such randomization could potentially increase the robustness of software systems with minimal impact on convenience, usability, and efficiency. Randomization of the amount of memory allocated on a stack frame is shown to disrupt a simple buffer overflow attack.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132198079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 577
Preventing denial-of-service attacks on a /spl mu/-kernel for WebOSes 防止针对/spl mu/-kernel的拒绝服务攻击
J. Liedtke, N. Islam, T. Jaeger
A goal of World Wide Web operating systems (WebOSes) is to enable clients to download executable content from servers connected to the World Wide Web (WWW). This will make applications more easily available to clients, but some of these applications may be malicious. Thus, a WebOS must be able to control the downloaded content's behavior. We examine a specific type of malicious activity: denial of service attacks using legal system operations. A denial of service attack occurs when an attacker prevents other users from performing their authorized operations. Even when the attacker may not be able to perform such operations. Current systems either do little to prevent denial of service attacks or have a limited scope of prevention of such attacks. For a WebOS, however, the ability to prevent denial of service should be an integral part of the system. We are developing a WebOS using the L4 /spl mu/ kernel as its substrate. We evaluate L4 as a basis of a system that can prevent denial of service attacks. In particular, we identify the /spl mu/ kernel related resources which are subject to denial of service attacks and define /spl mu/ kernel mechanisms to defend against such attacks. Our analysis demonstrates that system resource utilization can be managed by trusted user level servers to prevent denial of service attacks on such resources.
万维网操作系统(WebOSes)的一个目标是使客户机能够从连接到万维网(WWW)的服务器下载可执行的内容。这将使客户端更容易使用应用程序,但其中一些应用程序可能是恶意的。因此,WebOS必须能够控制下载内容的行为。我们研究了一种特定类型的恶意活动:使用法律系统操作的拒绝服务攻击。拒绝服务攻击是指攻击者阻止其他用户执行其授权的操作。即使攻击者可能无法执行此类操作。当前的系统要么在防止拒绝服务攻击方面做得很少,要么对此类攻击的预防范围有限。然而,对于WebOS来说,防止拒绝服务的能力应该是系统的一个组成部分。我们正在开发一个使用L4 /spl内核作为底层的WebOS。我们评估L4作为一个系统的基础,可以防止拒绝服务攻击。特别是,我们确定了/spl mu/ kernel相关的资源,这些资源会受到拒绝服务攻击,并定义了/spl mu/ kernel机制来防御此类攻击。我们的分析表明,系统资源利用可以由受信任的用户级服务器管理,以防止对此类资源的拒绝服务攻击。
{"title":"Preventing denial-of-service attacks on a /spl mu/-kernel for WebOSes","authors":"J. Liedtke, N. Islam, T. Jaeger","doi":"10.1109/HOTOS.1997.595186","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595186","url":null,"abstract":"A goal of World Wide Web operating systems (WebOSes) is to enable clients to download executable content from servers connected to the World Wide Web (WWW). This will make applications more easily available to clients, but some of these applications may be malicious. Thus, a WebOS must be able to control the downloaded content's behavior. We examine a specific type of malicious activity: denial of service attacks using legal system operations. A denial of service attack occurs when an attacker prevents other users from performing their authorized operations. Even when the attacker may not be able to perform such operations. Current systems either do little to prevent denial of service attacks or have a limited scope of prevention of such attacks. For a WebOS, however, the ability to prevent denial of service should be an integral part of the system. We are developing a WebOS using the L4 /spl mu/ kernel as its substrate. We evaluate L4 as a basis of a system that can prevent denial of service attacks. In particular, we identify the /spl mu/ kernel related resources which are subject to denial of service attacks and define /spl mu/ kernel mechanisms to defend against such attacks. Our analysis demonstrates that system resource utilization can be managed by trusted user level servers to prevent denial of service attacks on such resources.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115182221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Extensible kernels are leading OS research astray 可扩展内核正将操作系统研究引入歧途
P. Druschel, Vivek S. Pai, W. Zwaenepoel
Argues that ongoing research in extensible kernels largely fails to address the real challenges facing the operating systems (OS) community. Instead, these efforts have become entangled in trying to solve the safety problems that extensibility itself introduces into OS design. We propose a pragmatic approach to extensibility, where kernel extensions are used in experimental settings to evaluate and develop OS enhancements for demanding applications. Once developed and well understood, these enhancements are then migrated into the base OS for production use. This approach obviates the need for guaranteeing the safety of kernel extensions, allowing the OS research community to re-focus on the real challenges in OS design and implementation. To provide a concrete example of this approach, we analyze the techniques used in experimental HTTP servers to show how proper application design combined with generic enhancements to OSs can provide the same benefits without requiring application-specific kernel extensions.
认为正在进行的可扩展内核研究在很大程度上未能解决操作系统(OS)社区面临的真正挑战。相反,这些努力已经纠缠在试图解决可扩展性本身引入操作系统设计的安全问题上。我们提出了一种实用的可扩展性方法,在实验设置中使用内核扩展来评估和开发要求苛刻的应用程序的操作系统增强。一旦开发完成并得到充分理解,这些增强功能就会被迁移到基本操作系统中以供生产使用。这种方法避免了保证内核扩展安全性的需要,允许操作系统研究社区重新关注操作系统设计和实现中的真正挑战。为了提供这种方法的具体示例,我们分析了实验HTTP服务器中使用的技术,以展示如何将适当的应用程序设计与对操作系统的通用增强相结合,在不需要特定于应用程序的内核扩展的情况下提供相同的好处。
{"title":"Extensible kernels are leading OS research astray","authors":"P. Druschel, Vivek S. Pai, W. Zwaenepoel","doi":"10.1109/HOTOS.1997.595179","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595179","url":null,"abstract":"Argues that ongoing research in extensible kernels largely fails to address the real challenges facing the operating systems (OS) community. Instead, these efforts have become entangled in trying to solve the safety problems that extensibility itself introduces into OS design. We propose a pragmatic approach to extensibility, where kernel extensions are used in experimental settings to evaluate and develop OS enhancements for demanding applications. Once developed and well understood, these enhancements are then migrated into the base OS for production use. This approach obviates the need for guaranteeing the safety of kernel extensions, allowing the OS research community to re-focus on the real challenges in OS design and implementation. To provide a concrete example of this approach, we analyze the techniques used in experimental HTTP servers to show how proper application design combined with generic enhancements to OSs can provide the same benefits without requiring application-specific kernel extensions.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129094152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Operating system directions for the next Millennium 下一个千年的操作系统方向
W. Bolosky, Richard Draves, Robert P. Fitzgerald, C. Fraser, Michael B. Jones, Todd B. Knoblock, R. Rashid
We believe it is time to reexamine the operating system's role in computing. Operating systems exist to create an environment in which compelling applications come to life. They do that by providing abstractions built on the services provided by hardware. We argue that advances in hardware and networking technology enable a new kind of operating system to support tomorrow's applications. Such an operating system would raise the level of abstraction for developers and users, so that individual computers, file systems, and networks become unimportant to most computations in the same way that processor registers, disk sectors, and physical pages are today.
我们认为是时候重新审视操作系统在计算中的角色了。操作系统的存在是为了创造一个环境,在这个环境中,引人注目的应用程序得以实现。它们通过在硬件提供的服务基础上提供抽象来实现这一点。我们认为硬件和网络技术的进步使一种新的操作系统能够支持未来的应用程序。这样的操作系统将提高开发人员和用户的抽象级别,因此,单个计算机、文件系统和网络对于大多数计算来说变得不重要,就像今天的处理器寄存器、磁盘扇区和物理页面一样。
{"title":"Operating system directions for the next Millennium","authors":"W. Bolosky, Richard Draves, Robert P. Fitzgerald, C. Fraser, Michael B. Jones, Todd B. Knoblock, R. Rashid","doi":"10.1109/HOTOS.1997.595191","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595191","url":null,"abstract":"We believe it is time to reexamine the operating system's role in computing. Operating systems exist to create an environment in which compelling applications come to life. They do that by providing abstractions built on the services provided by hardware. We argue that advances in hardware and networking technology enable a new kind of operating system to support tomorrow's applications. Such an operating system would raise the level of abstraction for developers and users, so that individual computers, file systems, and networks become unimportant to most computations in the same way that processor registers, disk sectors, and physical pages are today.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133041139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
The role of trace modulation in building mobile computing systems 迹调制在构建移动计算系统中的作用
M. Satyanarayanan, Brian D. Noble
We put forth the view that trace modulation is an indispensable technique for building and evaluating mobile computing systems. The essence of our solution is transparent, real-time, trace-driven emulation of a target network. Although conceptually simple, trace modulation strikes an attractive balance between the conflicting demands of realism, ease-of-use, and reproducibility. It provides three important benefits. First, it allows control of the complexity of the network environment to which mobile software is exposed. Second, it enables mobile clients to be subjected to reproducible yet realistic network performance. Third, it allows easy exploration of a mobile system in the context of hypothetical mobility patterns and network infrastructures. These benefits suggest that trace modulation will play a central role in the development of future mobile computing systems.
我们提出了迹调制是构建和评估移动计算系统不可缺少的技术。我们的解决方案的本质是透明的、实时的、跟踪驱动的目标网络仿真。虽然在概念上很简单,但跟踪调制在现实主义、易用性和再现性的冲突需求之间取得了有吸引力的平衡。它提供了三个重要的好处。首先,它允许控制移动软件所暴露的网络环境的复杂性。其次,它使移动客户端能够承受可再现的、真实的网络性能。第三,它允许在假设的移动模式和网络基础设施的背景下轻松探索移动系统。这些优点表明,迹调制将在未来移动计算系统的发展中发挥核心作用。
{"title":"The role of trace modulation in building mobile computing systems","authors":"M. Satyanarayanan, Brian D. Noble","doi":"10.1109/HOTOS.1997.595196","DOIUrl":"https://doi.org/10.1109/HOTOS.1997.595196","url":null,"abstract":"We put forth the view that trace modulation is an indispensable technique for building and evaluating mobile computing systems. The essence of our solution is transparent, real-time, trace-driven emulation of a target network. Although conceptually simple, trace modulation strikes an attractive balance between the conflicting demands of realism, ease-of-use, and reproducibility. It provides three important benefits. First, it allows control of the complexity of the network environment to which mobile software is exposed. Second, it enables mobile clients to be subjected to reproducible yet realistic network performance. Third, it allows easy exploration of a mobile system in the context of hypothetical mobility patterns and network infrastructures. These benefits suggest that trace modulation will play a central role in the development of future mobile computing systems.","PeriodicalId":176246,"journal":{"name":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1