Security and Persistence

Security and Persistence

4.11 - 1251 ratings - Source

During a short visit to Bremen in December 1989 John Rosenberg had several discussions with me about computer architecture. Although we had previously worked together for more than a decade in Australia we had not seen each other for over a year, following my move to Bremen in 1988. Meanwhile John was spending a year on study leave at the University of St. Andrews in Scotland with Professor Ron Morrison and his persistent programming research group. From our conversations it was quite clear that John was having a most fruitful time in St. Andrews and was gaining valuable new insights into the world of persistent programming. He was very keen to explore the significance of these insights for the MONADS Project, which we had been jOintly directing since the early 1980s. MONADS was not about persistent programming. In fact it had quite different origins, in the areas of software engineering and information protection. In an earlier stage of the project our ideas on these themes had led us into the world of computer architecture and even hardware deSign, in our attempts to provide an efficient base machine for our software ideas. The most important practical result of this phase of the project had been the development of the MONADS-PC, a mini computer which would be better compared with say a V tvPart of COMANDOS. [8] B. Liskov, M. Herlihy, P. Johnson, G. Leavens, R. Scheifler, and W. Weihl. Preliminary ARGUS reference manual. Technical Report Memo 39, Programming Methodology Group, Massachusetts Institute of Technology, anbsp;...

Title:Security and Persistence
Author:John Rosenberg, J.Leslie Keedy
Publisher:Springer Science & Business Media - 2012-12-06


You Must CONTINUE and create a free account to access unlimited downloads & streaming