Skip to main content
  • Conference proceedings
  • © 1990

Security and Persistence

Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8–11 May 1990, Bremen, West Germany

Part of the book series: Workshops in Computing (WORKSHOPS COMP.)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

    Pages i-xviii
  2. Invited Presentations

    1. Front Matter

      Pages 1-1
    2. Capabilities and Security

      • Roger M. Needham
      Pages 3-8
    3. Persistent Languages and Architectures

      • R. Morrison, M. P. Atkinson
      Pages 9-28
  3. Principles and Models

    1. Front Matter

      Pages 29-29
    2. Dimensions of Addressing Schemes

      • Manojit Sarkar, Edward F. Gehringer
      Pages 31-47
    3. Protection in Persistent Object Systems

      • R. Morrison, A. L. Brown, R. C. H. Connor, Q. I. Cutts, G. Kirby, A. Dearle et al.
      Pages 48-66
  4. Security

    1. Front Matter

      Pages 83-83
    2. Charging in a Secure Environment

      • C. S. Wallace, R. D. Pose
      Pages 85-96
    3. Algorithms for Data Encryption

      • Wilhelm Müller
      Pages 97-105
    4. Capabilities and Encryption: The Ultimate Defense Against Security Attacks ?

      • B. Freisleben, P. Kammerer, J. L. Keedy
      Pages 106-119
  5. Architectures

    1. Front Matter

      Pages 121-121
    2. Implementing 128 Bit Persistent Addresses on 80x86 Processors

      • W. P. Cockshott, P. W. Foulk
      Pages 123-136
    3. Active Memory for Managing Persistent Objects

      • S. H. Lavington, R. A. J. Davies
      Pages 137-154
    4. A Layered Persistent Architecture for Napier88

      • A. L. Brown, R. Morrison, D. S. Munro, A. Dearle, J. Rosenberg
      Pages 155-172
    5. A Secure RISC-based Architecture Supporting Data Persistence

      • David Koch, John Rosenberg
      Pages 188-201
  6. Fault Tolerant Systems

    1. Front Matter

      Pages 215-215

About this book

During a short visit to Bremen in December 1989 John Rosenberg had several discussions with me about computer architecture. Although we had previously worked together for more than a decade in Australia we had not seen each other for over a year, following my move to Bremen in 1988. Meanwhile John was spending a year on study leave at the University of St. Andrews in Scotland with Professor Ron Morrison and his persistent programming research group. From our conversations it was quite clear that John was having a most fruitful time in St. Andrews and was gaining valuable new insights into the world of persistent programming. He was very keen to explore the significance of these insights for the MONADS Project, which we had been jOintly directing since the early 1980s. MONADS was not about persistent programming. In fact it had quite different origins, in the areas of software engineering and information protection. In an earlier stage of the project our ideas on these themes had led us into the world of computer architecture and even hardware deSign, in our attempts to provide an efficient base machine for our software ideas. The most important practical result of this phase of the project had been the development of the MONADS-PC, a mini­ computer which would be better compared with say a V tv< 11/750 than with a personal computer, despite its unfortunate name.

Editors and Affiliations

  • Department of Electrical Engineering and Computer Science, University of Newcastle, Australia

    John Rosenberg

  • Faculty of Mathematics and Computer Science, University of Bremen, Bremen 33, West Germany

    J. Leslie Keedy

Bibliographic Information

  • Book Title: Security and Persistence

  • Book Subtitle: Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8–11 May 1990, Bremen, West Germany

  • Editors: John Rosenberg, J. Leslie Keedy

  • Series Title: Workshops in Computing

  • DOI: https://doi.org/10.1007/978-1-4471-3178-6

  • Publisher: Springer London

  • eBook Packages: Springer Book Archive

  • Copyright Information: British Computer Society 1990

  • Softcover ISBN: 978-3-540-19646-4Published: 19 November 1990

  • eBook ISBN: 978-1-4471-3178-6Published: 06 December 2012

  • Series ISSN: 1431-1682

  • Edition Number: 1

  • Number of Pages: XVIII, 394

  • Number of Illustrations: 16 b/w illustrations

  • Additional Information: Published in collaboration with the British Computer Society

  • Topics: Software Engineering, Processor Architectures

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access