Currently a certifiably secure multiuser operating system does not exist; no operating system has been able to withstand mallcious attacks by skilled penetrators. While there is a strongly felt need in both the military and civilian sectors for reliably secure operating system software, any solution to the security problem must also take into account the enormous investment in existing equipment and software. In the present paper, hypervisors are discussed as one approach to retrofitting security, but rejected due to the high cost and complexity of installing them on existing equipment. Encapsulation, an alternative solution proposed for batch and remote batch entry applications, requires only a small amount of additional hardware and verified software. The resulting system can be certified to be secure, and is thus suitable for stringent military requirements. The solution is applicable---essentially unchanged---to a wide class of hardware and software, and it is not sensitive to special versions of (or changes to) operating system code. Operating efficiency and construction costs of the encapsulation method are discussed to demonstrate its feasibility. This work has been performed under Advanced Research Projects Agency Contract DAHC15 72 C 0308. It is part of a larger effort to provide securable operating systems in DOD environments.
目前还不存在可认证安全的多用户操作系统;没有任何操作系统能够抵御熟练的渗透者的恶意攻击。虽然军事和民用部门都强烈感到需要可靠安全的操作系统软件,但安全问题的任何解决方案也必须考虑到对现有设备和软件的巨大投资。在本文中,管理程序作为改进安全性的一种方法进行了讨论,但由于在现有设备上安装它们的高成本和复杂性而被拒绝。封装是为批处理和远程批处理输入应用程序提出的另一种解决方案,它只需要少量的额外硬件和经过验证的软件。由此产生的系统可以被证明是安全的,因此适用于严格的军事要求。该解决方案适用于——基本上不变的——广泛的硬件和软件类别,并且它对操作系统代码的特殊版本(或更改)不敏感。讨论了该封装方法的运行效率和造价,论证了其可行性。这项工作是根据高级研究计划局合同DAHC15 72 C 0308进行的。它是在国防部环境中提供安全操作系统的更大努力的一部分。
{"title":"Encapsulation: an approach to operating system security","authors":"R. Bisbey, G. Popek","doi":"10.1145/1408800.1408877","DOIUrl":"https://doi.org/10.1145/1408800.1408877","url":null,"abstract":"Currently a certifiably secure multiuser operating system does not exist; no operating system has been able to withstand mallcious attacks by skilled penetrators. While there is a strongly felt need in both the military and civilian sectors for reliably secure operating system software, any solution to the security problem must also take into account the enormous investment in existing equipment and software.\u0000 In the present paper, hypervisors are discussed as one approach to retrofitting security, but rejected due to the high cost and complexity of installing them on existing equipment. Encapsulation, an alternative solution proposed for batch and remote batch entry applications, requires only a small amount of additional hardware and verified software. The resulting system can be certified to be secure, and is thus suitable for stringent military requirements. The solution is applicable---essentially unchanged---to a wide class of hardware and software, and it is not sensitive to special versions of (or changes to) operating system code. Operating efficiency and construction costs of the encapsulation method are discussed to demonstrate its feasibility.\u0000 This work has been performed under Advanced Research Projects Agency Contract DAHC15 72 C 0308. It is part of a larger effort to provide securable operating systems in DOD environments.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Much of the past work in the study of algorithms has been done in terms of what the algorithm is intended to do, and the properties of algorithms that are studied in this connection are often, therefore, execution-related. Even when an algorithm has been studied in terms of the way it was written, terms such as block structure and control flow were commonly used, and the most basic constituent studied was the individual statement.
{"title":"A recent approach to the study of algorithms","authors":"S. Zweben","doi":"10.1145/1408800.1408922","DOIUrl":"https://doi.org/10.1145/1408800.1408922","url":null,"abstract":"Much of the past work in the study of algorithms has been done in terms of what the algorithm is intended to do, and the properties of algorithms that are studied in this connection are often, therefore, execution-related. Even when an algorithm has been studied in terms of the way it was written, terms such as block structure and control flow were commonly used, and the most basic constituent studied was the individual statement.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121048988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The growing importance of computer aided design is difficult to ignore. As systems become more complex and design lead times shrink, manual design techniques have proven inadequate, or at best very costly. Utilization of computers to reduce design time and cost has been advertised as a solution to this problem, but automated design methods also have drawbacks. For example, design automation (D.A.) is an immature discipline, suffering from many of the difficulties encountered in the evolution of a new specialization. Moreover, costs are high and outcomes are uncertain. The foundations upon which D.A. rests are themselves unsettled. Computer “Science” is still somewhat an art and manufacturing technology changes rapidly in some areas of application. Because D.A. is such a new discipline, very few practitioners have been formally trained in this field. There is, however, a recognized need for more entry level engineers and applied scientists with backgrounds in Design Automation. This paper briefly describes current D.A. teaching and research activities at Southern Methodist University, and suggests some of our future directions.
{"title":"Design automation at Southern Methodist University","authors":"Robert J. Smith","doi":"10.1145/800182.810426","DOIUrl":"https://doi.org/10.1145/800182.810426","url":null,"abstract":"The growing importance of computer aided design is difficult to ignore. As systems become more complex and design lead times shrink, manual design techniques have proven inadequate, or at best very costly. Utilization of computers to reduce design time and cost has been advertised as a solution to this problem, but automated design methods also have drawbacks. For example, design automation (D.A.) is an immature discipline, suffering from many of the difficulties encountered in the evolution of a new specialization. Moreover, costs are high and outcomes are uncertain. The foundations upon which D.A. rests are themselves unsettled. Computer “Science” is still somewhat an art and manufacturing technology changes rapidly in some areas of application.\u0000 Because D.A. is such a new discipline, very few practitioners have been formally trained in this field. There is, however, a recognized need for more entry level engineers and applied scientists with backgrounds in Design Automation. This paper briefly describes current D.A. teaching and research activities at Southern Methodist University, and suggests some of our future directions.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121020213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Few optimality results have been reported for the scheduling of computer systems with more than one resource. This paper considers a system with two independently-scheduled scarce resources, which may be thought of as a CPU and an I/O channel, and two active programs with distinct service burst time characteristics. Schedules requiring preemption no more frequently than when a program requests service at a resource are shown to be sufficient to achieve maximum average utilization (the unweighted average of the utilizations of the two resources). A rule that specifies schedules of this form when applied at both resources is defined and proven optimal. Finally, the more general problem of maximizing weighted utilization is treated.
{"title":"Scheduling in systems with two scarce resources","authors":"Ed Lazowska, K. Sevcik","doi":"10.1145/800182.810381","DOIUrl":"https://doi.org/10.1145/800182.810381","url":null,"abstract":"Few optimality results have been reported for the scheduling of computer systems with more than one resource. This paper considers a system with two independently-scheduled scarce resources, which may be thought of as a CPU and an I/O channel, and two active programs with distinct service burst time characteristics. Schedules requiring preemption no more frequently than when a program requests service at a resource are shown to be sufficient to achieve maximum average utilization (the unweighted average of the utilizations of the two resources). A rule that specifies schedules of this form when applied at both resources is defined and proven optimal. Finally, the more general problem of maximizing weighted utilization is treated.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126199867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An increasing number of computer users are implementing an on-line facility with the aid of a transaction monitor program. This transaction monitor may be supplied either by the computer hardware manufacturer or by a software supplier. It is felt that the literature is inadequate in aiding such a user to implement his system. Consequently this paper sets out to achieve such an aim by presenting a methodology for the design of a transaction-oriented system employing a transaction monitor. The decisions to be made are outlined together with the choices available for each decision. The methodology is iterative in that a decision at any stage can have a significant impact on the final design and is also affected by previously taken decisions.
{"title":"Design of transaction-oriented systems employing a transaction monitor","authors":"R. Davenport","doi":"10.1145/800182.810406","DOIUrl":"https://doi.org/10.1145/800182.810406","url":null,"abstract":"An increasing number of computer users are implementing an on-line facility with the aid of a transaction monitor program. This transaction monitor may be supplied either by the computer hardware manufacturer or by a software supplier. It is felt that the literature is inadequate in aiding such a user to implement his system. Consequently this paper sets out to achieve such an aim by presenting a methodology for the design of a transaction-oriented system employing a transaction monitor. The decisions to be made are outlined together with the choices available for each decision. The methodology is iterative in that a decision at any stage can have a significant impact on the final design and is also affected by previously taken decisions.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124906977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Professor Edward Feigenbaum will open the panel with comments on the current status of the field. Short presentations of specific current research will be made by the panelists: (1) Professor C. Kulikowski of Rutgers describing work on a causal-associative network developed with an associated model of the therapies to serve as a basis of a consultation program in glaucoma; (2) Dr. P. P. Tsiang of University of Missouri and (3) Dr. A. Gevins, University of California Medical Center, discussing their respective papers "Computer Analysis of Chest Radiographs" and "Heuristic Real Time Feature Extraction of the EEG", abstracts of which appear elsewhere in the program booklet; (4) Dr. Bruce Buchanan, on applications of AI to structure elucidation based on gas chromatography/mass spectrometry data; (5) Dr. Edward Shortliffe, Stanford University, on an antimicrobial therapy consultation system utilizing a flexible representation of knowledge and (6) T. Rindfleisch describing SUMEX-AIM, a new nationally shared resource for application of AI to medicine.
爱德华·费根鲍姆教授将对该领域的现状发表评论,开启小组讨论。小组成员将对当前的具体研究进行简短的介绍:(1)罗格斯大学的C. Kulikowski教授描述了在青光眼咨询项目的基础上开发的因果关联网络与相关治疗模型的工作;(2)密苏里大学的p.p. jiang博士和(3)加州大学医学中心的A. Gevins博士,讨论他们各自的论文《胸部x线片的计算机分析》和《脑电图的启发式实时特征提取》,论文摘要见节选手册;(4) Bruce Buchanan博士,关于AI在基于气相色谱/质谱数据的结构解析中的应用;(5)斯坦福大学的Edward Shortliffe博士介绍了一种利用灵活知识表示的抗菌治疗咨询系统;(6)T. Rindfleisch描述了SUMEX-AIM,这是一种新的国家共享资源,用于将人工智能应用于医学。
{"title":"Artificial intelligence research in medicine","authors":"E. Levinthal","doi":"10.1145/1408800.1408903","DOIUrl":"https://doi.org/10.1145/1408800.1408903","url":null,"abstract":"Professor Edward Feigenbaum will open the panel with comments on the current status of the field. Short presentations of specific current research will be made by the panelists: (1) Professor C. Kulikowski of Rutgers describing work on a causal-associative network developed with an associated model of the therapies to serve as a basis of a consultation program in glaucoma; (2) Dr. P. P. Tsiang of University of Missouri and (3) Dr. A. Gevins, University of California Medical Center, discussing their respective papers \"Computer Analysis of Chest Radiographs\" and \"Heuristic Real Time Feature Extraction of the EEG\", abstracts of which appear elsewhere in the program booklet; (4) Dr. Bruce Buchanan, on applications of AI to structure elucidation based on gas chromatography/mass spectrometry data; (5) Dr. Edward Shortliffe, Stanford University, on an antimicrobial therapy consultation system utilizing a flexible representation of knowledge and (6) T. Rindfleisch describing SUMEX-AIM, a new nationally shared resource for application of AI to medicine.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For the purposes of this discussion, I would like to define "tuning" as the adjustment of the variables in a generalized system to optimize it for a particular environment. The generalized systems we are talking about are called Generalized Data Base Management Systems or GDBMS, and I am going to talk about one of these: IBM's Information Management System, or IMS.
{"title":"Tuning the IMS data base management system","authors":"W. P. Grafton","doi":"10.1145/1408800.1408899","DOIUrl":"https://doi.org/10.1145/1408800.1408899","url":null,"abstract":"For the purposes of this discussion, I would like to define \"tuning\" as the adjustment of the variables in a generalized system to optimize it for a particular environment. The generalized systems we are talking about are called Generalized Data Base Management Systems or GDBMS, and I am going to talk about one of these: IBM's Information Management System, or IMS.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130276853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modes of information presentation for the blind programmer","authors":"M. Rahimi, J. B. Eulenberg","doi":"10.1145/1408800.1408820","DOIUrl":"https://doi.org/10.1145/1408800.1408820","url":null,"abstract":"","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A general syntax-directed strategy is described for translating computer programs written in a machine-level source language into equivalent programs in a higher-level target language. This translation process is referred to as decompilation or inverse compilation. Work on decompilation is potentially applicable in such areas as software portability, source-level debugging and diagnostic systems, and program analysis and validation.
{"title":"A syntax-directed approach to inverse compilation","authors":"C. R. Hollander","doi":"10.1145/1408800.1408926","DOIUrl":"https://doi.org/10.1145/1408800.1408926","url":null,"abstract":"A general syntax-directed strategy is described for translating computer programs written in a machine-level source language into equivalent programs in a higher-level target language. This translation process is referred to as decompilation or inverse compilation. Work on decompilation is potentially applicable in such areas as software portability, source-level debugging and diagnostic systems, and program analysis and validation.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"43 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130839346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a commercial hardware/software system which reads handprinted documents. The system recognizes a full upper case alphabet, all ten digits, and several special characters, intermixed, with minimal constraints imposed on the style of printing. The recognition algorithm, which incorporates a large number of heuristic methods, is described. On a test of over sixty thousand previously unseen characters produced by untrained clerks, fewer than six percent of the characters were “rejected” as unrecognizable, and only a few tenths of a percent were misrecognized.
{"title":"Handprint recognition on the GRAFIX I:: A commercial application of heuristic programming","authors":"A. Griffith","doi":"10.1145/800182.810427","DOIUrl":"https://doi.org/10.1145/800182.810427","url":null,"abstract":"This paper describes a commercial hardware/software system which reads handprinted documents. The system recognizes a full upper case alphabet, all ten digits, and several special characters, intermixed, with minimal constraints imposed on the style of printing. The recognition algorithm, which incorporates a large number of heuristic methods, is described. On a test of over sixty thousand previously unseen characters produced by untrained clerks, fewer than six percent of the characters were “rejected” as unrecognizable, and only a few tenths of a percent were misrecognized.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133215545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}