This paper describes object-based runtime support for efficient access to protected objects, i.e., objects belonging to server programs that export protected services to untrusted clients. Modern operating systems use hardware-based protection domains to protect a server's objects; clients can access those objects only through cross-domain (RPC) calls to methods that execute within the server's domain. Unfortunately, exclusive use of RPC compromises performance in exchange for protection. We show how to provide safe and e#cient access to server data by client read-sharing of some server objects and methods. Local client calls to readonly methods execute directly in shared memory, without the cost of protection crossing. We introdu...
The last decade has seen the transition from single-core processors to multi-cores and many-cores. T...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
The shared-memory programming model is attractive to programmers of parallel computers because they ...
Most distributed applications require, at least conceptually, some sort of shared state: information...
Remote procedure call (RPC) and shared variable are communication abstractions which allow the vario...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
C, C++ and most other popular low-level languages delegate memory management to the programmer, freq...
An important component of a programming language for writing operating systems, or other large para...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
This paper describes a new method for providing transparent fault tolerance for parallel application...
Our project applies automated proof checking to two application domains: protecting host computers f...
This paper addresses efficient object invocation in distributed systems. Such systems include suppor...
Internet application servers are currently designed to maximize resource efficiency by servicing man...
Safe language technology can be used for protection within a single address space. This protection ...
The last decade has seen the transition from single-core processors to multi-cores and many-cores. T...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
The shared-memory programming model is attractive to programmers of parallel computers because they ...
Most distributed applications require, at least conceptually, some sort of shared state: information...
Remote procedure call (RPC) and shared variable are communication abstractions which allow the vario...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
C, C++ and most other popular low-level languages delegate memory management to the programmer, freq...
An important component of a programming language for writing operating systems, or other large para...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
This paper describes a new method for providing transparent fault tolerance for parallel application...
Our project applies automated proof checking to two application domains: protecting host computers f...
This paper addresses efficient object invocation in distributed systems. Such systems include suppor...
Internet application servers are currently designed to maximize resource efficiency by servicing man...
Safe language technology can be used for protection within a single address space. This protection ...
The last decade has seen the transition from single-core processors to multi-cores and many-cores. T...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
The shared-memory programming model is attractive to programmers of parallel computers because they ...