654
Chapter 14
Protection
[Harrison et al. (1976)]
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, “Protec-
tion in Operating Systems”,
Communications of the ACM, Volume 19, Number 8
(1976), pages 461–471.
[Iliffe and Jodeit (1962)]
J. K. Iliffe and J. G. Jodeit, “A Dynamic Storage Alloca-
tion System”,
Computer Journal, Volume 5, Number 3 (1962), pages 200–209.
[Jones and Liskov (1978)]
A. K. Jones and B. H. Liskov, “A Language Extension
for Expressing Constraints on Data Access”,
Communications of the ACM, Volume
21, Number 5 (1978), pages 358–367.
[Kaashoek et al. (1997)]
M. F. Kaashoek, D. R. Engler, G. R. Ganger, H. M.
Briceno, R. Hunt, D. Mazieres, T. Pinckney, R. Grimm, J. Jannotti, and K. Macken-
zie, “Application Performance and Flexibility on Exokernel Systems”,
Pro-
ceedings of the ACM Symposium on Operating Systems Principles
(1997), pages
52–65.
Chia sẻ với bạn bè của bạn: