Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_23
Peter Brössler, J. Rosenberg
{"title":"Transactions in a Segmented Single Level Store Architecture","authors":"Peter Brössler, J. Rosenberg","doi":"10.1007/978-1-4471-3178-6_23","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_23","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127439012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_12
J. Kaiser
{"title":"An Object-Oriented Approach to Support System Reliability and Security","authors":"J. Kaiser","doi":"10.1007/978-1-4471-3178-6_12","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_12","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124750828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_5
M. Evered, J. L. Keedy
{"title":"A Model for Protection in Persistent Object-Oriented Systems","authors":"M. Evered, J. L. Keedy","doi":"10.1007/978-1-4471-3178-6_5","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_5","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126688304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_17
F. Henskens, J. Rosenberg, M. Hannaford
{"title":"Stability in a Network of MONADS-PC Computers","authors":"F. Henskens, J. Rosenberg, M. Hannaford","doi":"10.1007/978-1-4471-3178-6_17","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_17","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130539706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_19
C. Eckert
{"title":"Homogeneous Memory Management in the Context of the Veritos-Project","authors":"C. Eckert","doi":"10.1007/978-1-4471-3178-6_19","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_19","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114419707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_1
R. Needham
{"title":"Capabilities and Security","authors":"R. Needham","doi":"10.1007/978-1-4471-3178-6_1","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_1","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129240424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_16
J. Rosenberg, F. Henskens, A. L. Brown, R. Morrison, David S. Munro
{"title":"Stability in a Persistent Store Based on a Large Virtual Memory","authors":"J. Rosenberg, F. Henskens, A. L. Brown, R. Morrison, David S. Munro","doi":"10.1007/978-1-4471-3178-6_16","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_16","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128520915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_3
M. Sarkar, E. Gehringer
{"title":"Dimensions of Addressing Schemes","authors":"M. Sarkar, E. Gehringer","doi":"10.1007/978-1-4471-3178-6_3","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_3","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116372868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_4
R. Morrison, A. L. Brown, R. Connor, Q. Cutts, G. Kirby, A. Dearle, J. Rosenberg, D. Stemple
{"title":"Protection in Persistent Object Systems","authors":"R. Morrison, A. L. Brown, R. Connor, Q. Cutts, G. Kirby, A. Dearle, J. Rosenberg, D. Stemple","doi":"10.1007/978-1-4471-3178-6_4","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_4","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131340301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-1-4471-3178-6_10
S. Lavington, R. A. Davies
{"title":"Active Memory for Managing Persistent Objects","authors":"S. Lavington, R. A. Davies","doi":"10.1007/978-1-4471-3178-6_10","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_10","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133611896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}