Abstract
Most distributed operating systems constructed to date have lacked a unifying mechanism for naming and protection. In this paper we discuss a system, Amoeba, that uses capabilities for naming and protecting objects. In contrast to traditional, centralized operating systems, in which capabilities are managed by the operating system kernel, in Amoeba all the capabilities are managed directly by user code. To prevent tampering, the capabilities are protected cryptographically. The paper describes a variety of the issues involved, and gives four different ways of dealing with the access rights.
Original language | English |
---|---|
Title of host publication | Proceedings of the 6th International Conference on Distributed Computing Systems 1986 |
Place of Publication | Los Alamitos, CA |
Publisher | IEEE |
Pages | 558-563 |
Number of pages | 6 |
Publication status | Published - May 1986 |
Event | 6th International Conference on Distributed Computing Systems, ICDCS 1986 - Cambridge, United States Duration: 19 May 1986 → 23 May 1986 Conference number: 6 |
Conference
Conference | 6th International Conference on Distributed Computing Systems, ICDCS 1986 |
---|---|
Abbreviated title | ICDCS |
Country/Territory | United States |
City | Cambridge |
Period | 19/05/86 → 23/05/86 |