skip to main content
Skip header Section
The multics system: an examination of its structureJanuary 1972
Publisher:
  • MIT Press
  • 55 Hayward St.
  • Cambridge
  • MA
  • United States
ISBN:978-0-262-15012-5
Published:01 January 1972
Pages:
423
Skip Bibliometrics Section
Reflects downloads up to 28 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

This volume provides an overview of the Multics system developed at M.I.T.--a time-shared, general purpose utility like system with third-generation software. The advantage that this new system has over its predecessors lies in its expanded capacity to manipulate and file information on several levels and to police and control access to data in its various files. On the invitation of M.I.T.'s Project MAC, Elliott Organick developed over a period of years an explanation of the workings, concepts, and mechanisms of the Multics system. This book is a result of that effort, and is approved by the Computer Systems Research Group of Project MAC.

In keeping with his reputation as a writer able to explain technical ideas in the computer field clearly and precisely, the author develops an exceptionally lucid description of the Multics system, particularly in the area of "how it works." His stated purpose is to serve the expected needs of designers, and to help them "to gain confidence that they are really able to exploit the system fully, as they design increasingly larger programs and subsystems."

The chapter sequence was planned to build an understanding of increasingly larger entities. From segments and the addressing of segments, the discussion extends to ways in which procedure segments may link dynamically to one another and to data segments. Subsequent chapters are devoted to how Multics provides for the solution of problems, the file system organization and services, and the segment management functions of the Multics file system and how the user may employ these facilities to advantage. Ultimately, the author builds a picture of the life of a process in coexistence with other processes, and suggests ways to model or construct subsystems that are far more complex than could be implemented using predecessor computer facilities.

This volume is intended for the moderately well informed computer user accustomed to predecessor systems and familiar with some of the Multics overview literature. While not intended as a definitive work on this living, ever-changing system, the book nevertheless reflects Multics as it has been first implemented, and should reveal its flavor, structure and power for some time to come.

References

  1. M.I.T., Project MAC, "The Multiplexed Information and Computing Service: Programmers' Manual," Revision 7, April 5, 1971. Also called "Multics Programmers' Manual" or MPM. An updated reference manual giving calling sequences and reference information for all user callable subroutines and commands. Includes an introduction to the Multics programming environment and a guide to typical ways of using the system. approx. 800 pages.Google ScholarGoogle Scholar
  2. R. A. Freiburghouse, A User's Guide to the Multics FORTRAN Implementation (Cambridge, Mass.: Cambridge Information Systems Laboratory, General Electric Co., 1969). Subsequent printings will be issued by Honeywell. A document that provides the prospective Multics FORTRAN user with sufficient information to enable him to create and execute FORTRAN programs on Multics. It contains a complete definition of the Multics FORTRAN language as well as a description of the FORTRAN command and error messages. It also describes how to communicate with non-FORTRAN programs and discusses some of the fundamental characteristics of Multics that affect the FORTRAN user. 68 pages.Google ScholarGoogle Scholar
  3. The Multics PL/I Language Specification (Cambridge, Mass.: Cambridge Information Systems Laboratory, General Electric Co., n.d.). Subsequent printings will be issued by Honeywell. A reference manual that specifies precisely the subset of the PL/I language used on Multics. [It is a reprint of the appropriate sections of PL/I Language Specifications, IBM Reference Manual, Form Y33-6003-0 (Armonk, N.Y.: International Business Machines Corp., 1968).] 174 pages.Google ScholarGoogle Scholar
  4. R. A. Freiburghouse, J. D. Mills, and B. L. Wolman, A User's Guide to the Multics PL/I Implementation (Cambridge, Mass.: Cambridge Information Systems Laboratory, General Electric Co., 1969). Subsequent printings will be issued by Honeywell. Provides detailed information about how the PL/I language is embedded in the Multics programming environment. 53 pages. B. Manuals That May Be Examined in the Project MAC or Information Processing Center Document Rooms at M.I.T.Google ScholarGoogle Scholar
  5. "Multics System-Programmers' Manual." Also called MSPM. In principle, a complete reference manual describing how the system works inside. In fact, this document contains many sections that are inconsistent, inaccurate, or obsolete; it is in need of much upgrading. However, its overview sections are generally accurate and valuable if insight into the internal organization is desired. approx. 3,500 pages.Google ScholarGoogle Scholar
  6. M.I.T., Project MAC, "The Multics Programmers' Manual: System Programmers' Supplement," Revision 25, July 2, 1971. This updatable reference manual, in the same format as the "Multics Programmers' Manual," provides calling sequences of every system module. 850 pages.Google ScholarGoogle Scholar
  7. D. J. Riesenberg, EPLBSA Programmers' Reference Handbook (Cambridge, Mass.: Cambridge Information Systems Laboratory, 1968). A manual describing the assembly (machine) language for the GE 645 computer. The language has been renamed ALM since the publication of this manual. (Needed only by programmers with some special reason to use 645 machine language.) 85 pages.Google ScholarGoogle Scholar
  8. J. Andrews, M. L. Goudy, and J. E. Barnes, Model 645 Processor Reference Manual. Revision 4 (Cambridge, Mass.: Cambridge Information Systems Laboratory, Honeywell, 1971). A hardware description, including opcodes, addressing modifiers, etc. Of interest only to dedicated machine language programmers. 175 pages. C. Published Technical Papers about Multics Arranged Chronologically 1965Google ScholarGoogle Scholar
  9. F. J. Corbató and V. A. Vyssotsky, "Introduction and Overview of the Multics System," AFIPS Conference Proceedings, Volume 27, Part 1, 1965 Fall Joint Computer Conference (Washington, D. C.: Spartan Books, 1965), pp. 185--196.Google ScholarGoogle Scholar
  10. E. L. Glaser, et al., "System Design of a Computer for Time-Sharing Application," AFIPS Conference Proceedings, Volume 27, Part 1, 1965 Fall Joint Computer Conference (Washington, D. C.: Spartan Books, 1965), pp. 197--202.Google ScholarGoogle Scholar
  11. V. A. Vyssotsky, et al., "Structure of the Multics Supervisor," AFIPS Conference Proceedings, Volume 27, Part 1, 1965 Fall Joint Computer Conference (Washington, D. C.: Spartan Books, 1965), pp. 203--212.Google ScholarGoogle Scholar
  12. R. C. Daley and P. G. Newmann, "A General-Purpose File System for Secondary Storage," AFIPS Conference Proceedings, Volume 27, Part 1, 1965 Fall Joint Computer Conference (Washington, D. C.: Spartan Books, 1965), pp. 213--229.Google ScholarGoogle Scholar
  13. J. F. Ossanna, et al., "Communication and Input/Output Switching in a Multiplex Computing System," AFIPS Conference Proceedings, Volume 27, Part 1, 1965 Fall Joint Computer Conference (Washington, D. C.: Spartan Books, 1965), pp. 231--241.Google ScholarGoogle Scholar
  14. E. E. David, Jr. and R. M. Fano, "Some Thoughts About the Social Implications of Accessible Computing," AFIPS Conference Proceedings, Volume 27, Part 1, 1965 Fall Joint Computer Conference (Washington, D. C.: Spartan Books, 1965), pp. 243--247. 1968Google ScholarGoogle Scholar
  15. R. C. Daley and J. B. Dennis, "Virtual Memory, Processes, and Sharing in MULTICS," Communications of the ACM 11, no. 5 (1968): 306--312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. M. Graham, "Protection in an Information Processing Utility," Communications of the ACM 11, no. 5 (1968): 365--369.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. J. Corbató and J. H. Saltzer, "Some Considerations of Supervisor Program Design for Multiplexed Computer Systems," in Information Processing 68, Proceedings of IFIP Congress 1968, edited by A. J. H. Morrell, vol. 1 (Amsterdam: North-Holland, 1969), pp. 315--321. 1969Google ScholarGoogle Scholar
  18. F. J. Corbató, "PL/I as a Tool for System Programming," Datamation 15, no. 5 (1969): 68--76.Google ScholarGoogle Scholar
  19. A. Bensoussan, C. T. Clingen, and R. C. Daley, "The Multics Virtual Memory," Second Symposium on Operating Systems Principles, Princeton University, October 1969 (New York: Association for Computing Machinery, 1969), pp. 30--42.Google ScholarGoogle Scholar
  20. M. J. Spier and E. I. Organick, "The Multics Interprocess Communication Facility," Second Symposium on Operating System Principles, Princeton University, October 1969 (New York: Association for Computing Machinery, 1969), pp. 83--91.Google ScholarGoogle Scholar
  21. J. H. Saltzer and J. W. Gintell, "The Instrumentation of Multics," Second Symposium on Operating Systems Principles, Princeton University, October 1969 (New York: Association for Computing Machinery, 1969), pp. 167--174. Also in Communications of the ACM 13, no. 8 (1970): 495--500.Google ScholarGoogle Scholar
  22. F. J. Corbató, "A Paging Experiment with the Multics System," in In Honor of Philip M. Morse, edited by H. Feshbach and K. U. Ingard (Cambridge, Mass.: M.I.T. Press, 1969), pp. 217--228.Google ScholarGoogle Scholar
  23. R. A. Freiburghouse, "The Multics PL/I Compiler," AFIPS Conference Proceedings, Volume 35, 1969 Fail Joint Computer Conference (Montvale, N. J.: AFIPS Press, 1969), pp. 187--199.Google ScholarGoogle Scholar
  24. J. M. Grochow, "Real-Time Graphic Display of Time-Sharing System Operating Characteristics," AFIPS Conference Proceedings, Volume 35, 1969 Fall Joint Computer Conference (Montvale, N. J.: AFIPS Press, 1969), pp. 379--385. 1970Google ScholarGoogle Scholar
  25. J. H. Saltzer and J. F. Ossanna, "Remote Terminal Character Stream Processing in Multics," AFIPS Conference Proceedings, Volume 36, 1970 Spring Joint Computer Conference (Montvale, N. J.: AFIPS Press, 1970), pp. 621--627.Google ScholarGoogle Scholar
  26. J. F. Ossanna and J. H. Saltzer, "Technical and Human Engineering Problems in Connecting Terminals to a Time-Sharing System," AFIPS Conference Proceedings, Volume 37, 1970 Fall Joint Computer Conference (Montvale, N. J.: AFIPS Press, 1970), pp. 355--362. 1971Google ScholarGoogle Scholar
  27. D. D. Clark, R. M. Graham, J. H. Saltzer, and M. D. Schroeder, "The Classroom Information and Computing Service," M.I.T. Project MAC Technical Report TR-80, January 11, 1971.Google ScholarGoogle Scholar
  28. M. D. Schroeder, "Performance of the GE-645 Associative Memory While Multics Is in Operation," ACM Workshop on System Performance Evaluation, April 1971 (New York: Association for Computing Machinery, 1971), pp. 227--245.Google ScholarGoogle Scholar
  29. M. D. Schroeder and J. H. Saltzer, "A Hardware Architecture for Implementing Protection Rings," Third Symposium on Operating Systems Principles, Palo Alto, California, October 1971 (New York: Association for Computing Machinery, 1971), pp. 42--54.Google ScholarGoogle Scholar
  30. R. J. Feiertag and E. I. Organick, "The Multics Input-Output System," Third Symposium on Operating Systems Principles, Palo Alto, California, October 1971 (New York: Association for Computing Machinery, 1971), pp. 35--41. D. M.I.T. Theses Related to MulticsGoogle ScholarGoogle Scholar
  31. J. H. Saltzer, "Traffic Control in a Multiplexed Computer System," Sc.D., 1966. MAC-TR-30.Google ScholarGoogle Scholar
  32. H. Deitel, "Absentee Computations in a Multiple-Access Computer System," S.M., 1968. MAC-TR-52.Google ScholarGoogle Scholar
  33. J. M. Grochow, "The Graphic Display as an Aid in the Monitoring of a Time-Shared Computer System," S.M., 1968. MAC-TR-54.Google ScholarGoogle Scholar
  34. R. Rappaport, "Implementing Multi-Process Primitives in a Multiplexed Computer System," S.M., 1968. MAC-TR-55.Google ScholarGoogle Scholar
  35. H. J. Greenbaum, "A Simulator of Multiple Interactive Users to Drive a Time-Shared Computer System," S.M., 1968. MAC-TR-58.Google ScholarGoogle Scholar
  36. R. I. Ancona, "A Compiler for MAD-Based Language on Multics," S.M., 1968.Google ScholarGoogle Scholar
  37. D. Clark, "A Reduction Analysis System for Parsing PL/I," S.M., 1968.Google ScholarGoogle Scholar
  38. M. D. Schroeder, "Classroom Model of an Information and Computing Service," S.M., 1969.Google ScholarGoogle Scholar
  39. C. K Vogt, "Suspension of Processes in a Multiprocessing Computer System," S.M., 1970.Google ScholarGoogle Scholar
  40. R. Frankston, "A Limited Service System on Multics," S.B., 1970.Google ScholarGoogle Scholar
  41. R. R. Schell, "Dynamic Reconfiguration in a Modular Computer System," Ph.D., 1971.Google ScholarGoogle Scholar

Cited By

  1. ACM
    Mahéo A, Sutra P and Tarrant T The serverless shell Proceedings of the 22nd International Middleware Conference: Industrial Track, (9-15)
  2. ACM
    Lefort A, Pipereau Y, Amponsem K, Sutra P and Thomas G J-NVM Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles, (408-423)
  3. ACM
    Zuo C, Zhao Q and Lin Z AUTHSCOPE Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (799-813)
  4. ACM
    Koziris N Fifty years of evolution in virtualization technologies Proceedings of the 19th Panhellenic Conference on Informatics, (3-4)
  5. ACM
    Dautenhahn N, Kasampalis T, Dietz W, Criswell J and Adve V (2015). Nested Kernel, ACM SIGARCH Computer Architecture News, 43:1, (191-206), Online publication date: 29-May-2015.
  6. ACM
    Dautenhahn N, Kasampalis T, Dietz W, Criswell J and Adve V (2015). Nested Kernel, ACM SIGPLAN Notices, 50:4, (191-206), Online publication date: 12-May-2015.
  7. Yost J (2015). The Origin and Early History of the Computer Security Software Products Industry, IEEE Annals of the History of Computing, 37:2, (46-58), Online publication date: 1-Apr-2015.
  8. ACM
    Dautenhahn N, Kasampalis T, Dietz W, Criswell J and Adve V Nested Kernel Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, (191-206)
  9. Yarom Y and Falkner K FLUSH+RELOAD Proceedings of the 23rd USENIX conference on Security Symposium, (719-732)
  10. ACM
    Kwon A, Dhawan U, Smith J, Knight T and DeHon A Low-fat pointers Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (721-732)
  11. ACM
    Denning P and Dennis J (2010). The resurgence of parallelism, Communications of the ACM, 53:6, (30-32), Online publication date: 1-Jun-2010.
  12. ACM
    Johnson M, Bellovin S, Reeder R and Schechter S Laissez-faire file sharing Proceedings of the 2009 workshop on New security paradigms workshop, (1-10)
  13. ACM
    Park J, Lee J, Kim S and Hong S (2009). Quasistatic shared libraries and XIP for memory footprint reduction in MMU-less embedded systems, ACM Transactions on Embedded Computing Systems, 8:1, (1-27), Online publication date: 1-Dec-2008.
  14. Gollmann D Security in Distributed Applications Advances in Software Engineering, (254-276)
  15. Jacob B, Ng S and Wang D (2007). Memory Systems, 10.5555/1543376, Online publication date: 10-Sep-2007.
  16. Xia L, Huang W and Huang H A compositional multiple policies operating system security model Proceedings of the 8th international conference on Information security applications, (291-302)
  17. ACM
    Corbató F On building systems that will fail ACM Turing award lectures
  18. ACM
    Ritchie D Reflections on software research ACM Turing award lectures
  19. Donnelly A (2006). Lightweight thread tunnelling in network applications, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:14, (2462-2474), Online publication date: 5-Oct-2006.
  20. ACM
    Bishop M Position Proceedings of the 2005 workshop on New security paradigms, (77-78)
  21. Gligor V On the evolution of adversary models in security protocols Proceedings of the 13th international conference on Security protocols, (276-283)
  22. ACM
    Lafitte J (2004). 40 years later .... a new engine to handle an operating system infrastructure, ACM SIGARCH Computer Architecture News, 32:4, (15-22), Online publication date: 1-Sep-2004.
  23. Schellhorn G, Reif W, Schairer A, Karger P, Austel V and Toll D (2002). Verified formal security models for multiapplicative smart cards, Journal of Computer Security, 10:4, (339-367), Online publication date: 1-Dec-2002.
  24. ACM
    Lawson H (2002). Rebirth of the computer industry, Communications of the ACM, 45:6, (25-29), Online publication date: 1-Jun-2002.
  25. Chander A, Mitchell J and Dean D A State-Transition Model of Trust Management and Access Control Proceedings of the 14th IEEE workshop on Computer Security Foundations
  26. Spencer R, Smalley S, Loscocco P, Hibler M, Andersen D and Lepreau J The flask security architecture Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (11-11)
  27. Jacob B and Mudge T (1998). Virtual Memory in Contemporary Microprocessors, IEEE Micro, 18:4, (60-75), Online publication date: 1-Jul-1998.
  28. Jacob B and Mudge T (1998). Virtual Memory, Computer, 31:6, (33-43), Online publication date: 1-Jun-1998.
  29. ACM
    Dean D The security of static typing with dynamic linking Proceedings of the 4th ACM conference on Computer and communications security, (18-27)
  30. ACM
    Hagimont D, Mossière J and Hemming C Hidden capabilities Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (219-223)
  31. ACM
    Ritchie D The development of the C programming language History of programming languages---II, (671-698)
  32. ACM
    Steele G and Gabriel R The evolution of Lisp History of programming languages---II, (233-330)
  33. ACM
    Talluri M, Hill M and Khalidi Y (1995). A new page table for 64-bit address spaces, ACM SIGOPS Operating Systems Review, 29:5, (184-200), Online publication date: 3-Dec-1995.
  34. ACM
    Talluri M, Hill M and Khalidi Y A new page table for 64-bit address spaces Proceedings of the fifteenth ACM symposium on Operating systems principles, (184-200)
  35. Lee J (1995). The Rise and Fall of the General Electric Corporation Computer Department, IEEE Annals of the History of Computing, 17:4, (24-45), Online publication date: 1-Dec-1995.
  36. ACM
    Cheung W and Loong A (1995). Exploring issues of operating systems structuring, ACM SIGOPS Operating Systems Review, 29:4, (4-16), Online publication date: 1-Oct-1995.
  37. Berman A, Bourassa V and Selberg E TRON Proceedings of the USENIX 1995 Technical Conference Proceedings, (14-14)
  38. Schmidt H (1994). Using naming strategies to make massively parallel systems work, Scientific Programming, 3:4, (289-300), Online publication date: 20-Dec-1994.
  39. ACM
    Talluri M and Hill M (1994). Surpassing the TLB performance of superpages with less operating system support, ACM SIGOPS Operating Systems Review, 28:5, (171-182), Online publication date: 1-Dec-1994.
  40. ACM
    Talluri M and Hill M Surpassing the TLB performance of superpages with less operating system support Proceedings of the sixth international conference on Architectural support for programming languages and operating systems, (171-182)
  41. ACM
    Talluri M and Hill M (1994). Surpassing the TLB performance of superpages with less operating system support, ACM SIGPLAN Notices, 29:11, (171-182), Online publication date: 1-Nov-1994.
  42. ACM
    Hagimont D, Chevalier P, Freyssinet A, Krakowiak S, Lacourte S, Mossière J and Rousset de Pina X (1994). Persistent shared object support in the Guide system, ACM SIGPLAN Notices, 29:10, (129-144), Online publication date: 1-Oct-1994.
  43. ACM
    Hagimont D, Chevalier P, Freyssinet A, Krakowiak S, Lacourte S, Mossière J and Rousset de Pina X Persistent shared object support in the Guide system Proceedings of the ninth annual conference on Object-oriented programming systems, language, and applications, (129-144)
  44. Chevalier P, Freyssinet A, Hagimont D, Krakowiak S, Lacourte S and de Pina X Experience with shared object support in the GUIDE system USENIX Systems on USENIX Experiences with Distributed and Multiprocessor Systems - Volume 4, (8-8)
  45. Murray K, Wilkinson T, Osmon P, Saulsbury A, Stiemerling T and Kelly P Design and implementation of an object-orientated 64-bit single address space microkernel USENIX Symposium on USENIX Microkernels and Other Kernel Architectures Symposium - Volume 4, (4-4)
  46. Nelson M and Hamilton G High performance dynamic linking through caching Proceedings of the USENIX Summer 1993 Technical Conference on Summer technical conference - Volume 1, (1-14)
  47. ACM
    Ritchie D The development of the C language The second ACM SIGPLAN conference on History of programming languages, (201-208)
  48. ACM
    Smith P and Graham J A simple balanced search tree Proceedings of the 1993 ACM conference on Computer science, (461-465)
  49. ACM
    Ritchie D (1993). The development of the C language, ACM SIGPLAN Notices, 28:3, (201-208), Online publication date: 1-Mar-1993.
  50. ACM
    Chevalier P, Hagimont D, Krakowiak S and de Pina X System support for shared objects Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring, (1-5)
  51. ACM
    Talluri M, Kong S, Hill M and Patterson D Tradeoffs in supporting two page sizes Proceedings of the 19th annual international symposium on Computer architecture, (415-424)
  52. ACM
    Talluri M, Kong S, Hill M and Patterson D (1992). Tradeoffs in supporting two page sizes, ACM SIGARCH Computer Architecture News, 20:2, (415-424), Online publication date: 1-May-1992.
  53. ACM
    Salomon D (1992). Four Dimensions of programming-language independence, ACM SIGPLAN Notices, 27:3, (35-53), Online publication date: 1-Mar-1992.
  54. ACM
    Corbató F (1991). On building systems that will fail, Communications of the ACM, 34:9, (72-81), Online publication date: 1-Sep-1991.
  55. ACM
    Yokote Y, Teraoka F, Mitsuzawa A, Fujinami N and Tokoro M (1991). The muse object architecture, ACM SIGOPS Operating Systems Review, 25:2, (22-46), Online publication date: 1-Apr-1991.
  56. Perry D and Kaiser G (1991). Models of Software Development Environments, IEEE Transactions on Software Engineering, 17:3, (283-295), Online publication date: 1-Mar-1991.
  57. Black D (1990). Scheduling Support for Concurrency and Parallelism in the Mach Operating System, Computer, 23:5, (35-43), Online publication date: 1-May-1990.
  58. ACM
    Braunstein A, Riley M and Wilkes J (1989). Improving the efficiency of UNIX buffer caches, ACM SIGOPS Operating Systems Review, 23:5, (71-82), Online publication date: 1-Nov-1989.
  59. ACM
    Braunstein A, Riley M and Wilkes J Improving the efficiency of UNIX buffer caches Proceedings of the twelfth ACM symposium on Operating systems principles, (71-82)
  60. ACM
    Banâtre J, Banâtre M, Lecler P, Ployette F and Le Certen P Fragmented and replicated objects in the GOTHIC distributed system Proceedings of the 3rd workshop on ACM SIGOPS European workshop: Autonomy or interdependence in distributed systems?, (1-4)
  61. Kaiser J (1988). MUTABOR, a Coprocessor Supporting Memory Management in an Object-Oriented Architecture, IEEE Micro, 8:5, (30-46), Online publication date: 1-Sep-1988.
  62. Rashid R, Tevanin A, Young M, Golub D and Baron R (1988). Machine-Independent Virtual Memory Management for Paged Uniprocessor and Multiprocessor Architectures, IEEE Transactions on Computers, 37:8, (896-908), Online publication date: 1-Aug-1988.
  63. Perry D and Kaiser G Models of software development environments Proceedings of the 10th international conference on Software engineering, (60-68)
  64. ACM
    Rashid R, Tevanian A, Young M, Golub D, Baron R, Black D, Bolosky W and Chew J (1987). Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures, ACM SIGARCH Computer Architecture News, 15:5, (31-39), Online publication date: 1-Nov-1987.
  65. ACM
    Rashid R, Tevanian A, Young M, Golub D, Baron R, Black D, Bolosky W and Chew J Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures Proceedings of the second international conference on Architectual support for programming languages and operating systems, (31-39)
  66. ACM
    Rashid R, Tevanian A, Young M, Golub D, Baron R, Black D, Bolosky W and Chew J (1987). Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures, ACM SIGPLAN Notices, 22:10, (31-39), Online publication date: 1-Oct-1987.
  67. ACM
    Rashid R, Tevanian A, Young M, Golub D, Baron R, Black D, Bolosky W and Chew J (1987). Machine-independent virtual memory management for paged uniprocessor and multiprocessor architectures, ACM SIGOPS Operating Systems Review, 21:4, (31-39), Online publication date: 1-Oct-1987.
  68. ACM
    Wu T Space saving key-lock access control system (abstract only) Proceedings of the 15th annual conference on Computer Science
  69. ACM
    Abramson D and Rosenberg J (1986). The microarchitecture of a capability-based computer, ACM SIGMICRO Newsletter, 17:4, (138-145), Online publication date: 21-Dec-1986.
  70. ACM
    Abramson D and Rosenberg J The microarchitecture of a capability-based computer Proceedings of the 19th annual workshop on Microprogramming, (138-145)
  71. ACM
    Quarterman J and Hoskins J (1986). Notable computer networks, Communications of the ACM, 29:10, (932-971), Online publication date: 1-Oct-1986.
  72. ACM
    Banâtre J, Banâtre M, Lapalme G and Ployette F (1986). The design and building of Enchère, a distributed electronic marketing system, Communications of the ACM, 29:1, (19-29), Online publication date: 1-Jan-1986.
  73. ACM
    Leach P, Levine P, Hamilton J and Stumpf B The file system of an integrated local network Proceedings of the 1985 ACM thirteenth annual conference on Computer Science, (309-324)
  74. ACM
    Ritchie D (1984). Reflections on software research, Communications of the ACM, 27:8, (758-760), Online publication date: 1-Aug-1984.
  75. ACM
    Stonebraker M (1984). Virtual memory transaction management, ACM SIGOPS Operating Systems Review, 18:2, (8-16), Online publication date: 1-Apr-1984.
  76. ACM
    Feustel E (1984). Process exchange on the PR1ME family of computers, ACM SIGARCH Computer Architecture News, 12:1, (32-43), Online publication date: 1-Mar-1984.
  77. ACM
    Silverman J (1983). Reflections on the verification of the security of an operating system kernel, ACM SIGOPS Operating Systems Review, 17:5, (143-154), Online publication date: 31-Dec-1983.
  78. ACM
    Silverman J Reflections on the verification of the security of an operating system kernel Proceedings of the ninth ACM symposium on Operating systems principles, (143-154)
  79. ACM
    Klebanoff J (1983). The iAPX 286 protection architecture, ACM SIGSMALL Newsletter, 9:1, (13-17), Online publication date: 1-Feb-1983.
  80. ACM
    Bunt R, Harbus R and Plumb S (1982). The effective management of paging storage hierarchies, ACM SIGMETRICS Performance Evaluation Review, 11:4, (30-38), Online publication date: 1-Dec-1982.
  81. ACM
    Bunt R, Harbus R and Plumb S The effective management of paging storage hierarchies Proceedings of the 1982 ACM SIGMETRICS conference on Measurement and modeling of computer systems, (30-38)
  82. ACM
    Leach P, Stumpf B, Hamilton J and Levine P UIDs as internal names in a distributed file system Proceedings of the first ACM SIGACT-SIGOPS symposium on Principles of distributed computing, (34-41)
  83. Castillo X, McConnel S and Siewiorek D (1982). Derivation and Calibration of a Transient Error Reliability Model, IEEE Transactions on Computers, 31:7, (658-671), Online publication date: 1-Jul-1982.
  84. ACM
    Brooks R, Gabriel R and Steele G An optimizing compiler for lexically scoped LISP Proceedings of the 1982 SIGPLAN symposium on Compiler construction, (261-275)
  85. ACM
    Brooks R, Gabriel R and Steele G (1982). An optimizing compiler for lexically scoped LISP, ACM SIGPLAN Notices, 17:6, (261-275), Online publication date: 1-Jun-1982.
  86. Miller L A heterogeneous multiprocessor design and the distributed scheduling of its task group workload Proceedings of the 9th annual symposium on Computer Architecture, (283-290)
  87. ACM
    Miller L (1982). A heterogeneous multiprocessor design and the distributed scheduling of its task group workload, ACM SIGARCH Computer Architecture News, 10:3, (283-290), Online publication date: 1-Apr-1982.
  88. ACM
    Fenchel R (1981). An integral approach to user assistance, ACM SIGSOC Bulletin, 13:2-3, (98-104), Online publication date: 1-Jan-1982.
  89. ACM
    Janson P (1981). Using type-extension to organize virtual-memory mechanisms, ACM SIGOPS Operating Systems Review, 15:4, (6-38), Online publication date: 1-Oct-1981.
  90. ACM
    Denning P, Dennis T and Brumfield J (1981). Low contention semaphores and ready lists, Communications of the ACM, 24:10, (687-699), Online publication date: 1-Oct-1981.
  91. ACM
    Fenchel R An integral approach to user assistance Proceedings of the Joint Conference on Easier and More Productive Use of Computer Systems. (Part - II): Human Interface and the User Interface - Volume 1981, (98-104)
  92. Andrews G and Dobkin D Active data structures Proceedings of the 5th international conference on Software engineering, (354-362)
  93. ACM
    Allchin J, Keller A and Wiederhold G FLASH Proceedings of the 1980 ACM SIGMOD international conference on Management of data, (151-156)
  94. ACM
    Gligor V Architectural implications of abstract data type implementation Proceedings of the 6th annual symposium on Computer architecture, (20-30)
  95. ACM
    Patwardhan N Useful and necessary features in a general interprocess communication facility Proceedings of the 17th annual Southeast regional conference, (93-97)
  96. ACM
    Tanenbaum A (1979). A method for implementing paged, segmented virtual memories on microprogrammable computers, ACM SIGOPS Operating Systems Review, 13:2, (26-32), Online publication date: 1-Apr-1979.
  97. ACM
    Dobkin D, Jones A and Lipton R (1979). Secure databases, ACM Transactions on Database Systems, 4:1, (97-106), Online publication date: 1-Mar-1979.
  98. ACM
    Keedy J (1979). On structuring operating systems with monitors, ACM SIGOPS Operating Systems Review, 13:1, (5-9), Online publication date: 1-Jan-1979.
  99. ACM
    Karger P The Lattice Security Model In A Public Computing Network Proceedings of the 1978 annual conference, (453-459)
  100. ACM
    Battarel G and Chevance R (1978). Design of a high level language machine, ACM SIGARCH Computer Architecture News, 6:9, (5-17), Online publication date: 1-Jun-1978.
  101. ACM
    Reghbati H and Hamacher V Hardware support for concurrent programming in loosely coupled multiprocessors Proceedings of the 5th annual symposium on Computer architecture, (195-201)
  102. ACM
    Montgomery W Measurements of sharing in Multics Proceedings of the sixth ACM symposium on Operating systems principles, (85-90)
  103. ACM
    Montgomery W (1977). Measurements of sharing in Multics, ACM SIGOPS Operating Systems Review, 11:5, (85-90), Online publication date: 1-Nov-1977.
  104. ACM
    Ivie E (1977). The programmer's workbench—a machine for software development, Communications of the ACM, 20:10, (746-753), Online publication date: 1-Oct-1977.
  105. Trivedi K (1977). On the Paging Performance of Array Algorithms, IEEE Transactions on Computers, 26:10, (938-947), Online publication date: 1-Oct-1977.
  106. ACM
    Gifford D (1977). Hardware estimation of a process' primary memory requirements, Communications of the ACM, 20:9, (655-663), Online publication date: 1-Sep-1977.
  107. ACM
    Mamrak S (1977). Dynamic response time prediction for computer networks, Communications of the ACM, 20:7, (461-468), Online publication date: 1-Jul-1977.
  108. ACM
    MacLaren M (1977). Exception handling in PL/I, ACM SIGOPS Operating Systems Review, 11:2, (101-104), Online publication date: 1-Apr-1977.
  109. ACM
    MacLaren M Exception handling in PL/I Proceedings of an ACM conference on Language design for reliable software, (101-104)
  110. ACM
    MacLaren M (1977). Exception handling in PL/I, ACM SIGSOFT Software Engineering Notes, 2:2, (101-104), Online publication date: 1-Mar-1977.
  111. ACM
    MacLaren M (1977). Exception handling in PL/I, ACM SIGPLAN Notices, 12:3, (101-104), Online publication date: 1-Mar-1977.
  112. ACM
    Denning P (1976). Fault Tolerant Operating Systems, ACM Computing Surveys, 8:4, (359-389), Online publication date: 1-Dec-1976.
  113. ACM
    Donovan J (1976). Tools and philosophy for software education, Communications of the ACM, 19:8, (430-436), Online publication date: 1-Aug-1976.
  114. ACM
    Denning D (1976). A lattice model of secure information flow, Communications of the ACM, 19:5, (236-243), Online publication date: 1-May-1976.
  115. ACM
    Goodenough J (1975). Exception handling, Communications of the ACM, 18:12, (683-696), Online publication date: 1-Dec-1975.
  116. ACM
    Jones A and Lipton R The enforcement of security policies for computation Proceedings of the fifth ACM symposium on Operating systems principles, (197-206)
  117. ACM
    Lipner S A comment on the confinement problem Proceedings of the fifth ACM symposium on Operating systems principles, (192-196)
  118. ACM
    Arden B and Berenbaum A A multi-microprocessor computer system architecture Proceedings of the fifth ACM symposium on Operating systems principles, (114-121)
  119. ACM
    Janson P Dynamic linking and environment initialization in a multi-domain process. Proceedings of the fifth ACM symposium on Operating systems principles, (43-50)
  120. ACM
    Jones A and Lipton R (1975). The enforcement of security policies for computation, ACM SIGOPS Operating Systems Review, 9:5, (197-206), Online publication date: 1-Nov-1975.
  121. ACM
    Lipner S (1975). A comment on the confinement problem, ACM SIGOPS Operating Systems Review, 9:5, (192-196), Online publication date: 1-Nov-1975.
  122. ACM
    Arden B and Berenbaum A (1975). A multi-microprocessor computer system architecture, ACM SIGOPS Operating Systems Review, 9:5, (114-121), Online publication date: 1-Nov-1975.
  123. ACM
    Janson P (1975). Dynamic linking and environment initialization in a multi-domain process., ACM SIGOPS Operating Systems Review, 9:5, (43-50), Online publication date: 1-Nov-1975.
  124. ACM
    Peebles R and Manning E A computer architecture for large (distributed) data bases Proceedings of the 1st International Conference on Very Large Data Bases, (405-427)
  125. Bernstein A and Siegel P (1975). A Computer Architecture for Level Structured Systems, IEEE Transactions on Computers, 24:8, (785-793), Online publication date: 1-Aug-1975.
  126. ACM
    Goodenough J (1975). Exception handling design issues, ACM SIGPLAN Notices, 10:7, (41-45), Online publication date: 1-Jul-1975.
  127. ACM
    Walter K, Schaen S, Ogden W, Rounds W, Shumway D, Schaeffer D, Biba K, Bradshaw F, Ames S and Gilligan J (1975). Structured specification of a Security Kernel, ACM SIGPLAN Notices, 10:6, (285-293), Online publication date: 1-Jun-1975.
  128. ACM
    Robinson L, Levitt K, Neumann P and Saxena A (1975). On attaining reliable software for a secure operating system, ACM SIGPLAN Notices, 10:6, (267-284), Online publication date: 1-Jun-1975.
  129. ACM
    Kimbleton S A heuristic approach to computer systems performance improvement, I Proceedings of the May 19-22, 1975, national computer conference and exposition, (839-846)
  130. ACM
    Linde R Operating system penetration Proceedings of the May 19-22, 1975, national computer conference and exposition, (361-368)
  131. ACM
    Thomas R JSYS traps Proceedings of the May 19-22, 1975, national computer conference and exposition, (351-360)
  132. ACM
    Cook T A data base management system design philosophy Proceedings of the 1975 ACM SIGMOD international conference on Management of data, (15-22)
  133. ACM
    Walter K, Schaen S, Ogden W, Rounds W, Shumway D, Schaeffer D, Biba K, Bradshaw F, Ames S and Gilligan J Structured specification of a Security Kernel Proceedings of the international conference on Reliable software, (285-293)
  134. ACM
    Robinson L, Levitt K, Neumann P and Saxena A On attaining reliable software for a secure operating system Proceedings of the international conference on Reliable software, (267-284)
  135. ACM
    Hayashi T A new approach to construction of computer systems Proceedings of the 1975 annual conference, (19-23)
  136. ACM
    Goodenough J Structured exception handling Proceedings of the 2nd ACM SIGACT-SIGPLAN symposium on Principles of programming languages, (204-224)
  137. ACM
    Fabry R (1974). Capability-based addressing, Communications of the ACM, 17:7, (403-412), Online publication date: 1-Jul-1974.
  138. ACM
    Saltzer J (1974). Protection and the control of information sharing in multics, Communications of the ACM, 17:7, (388-402), Online publication date: 1-Jul-1974.
  139. ACM
    Spier M, Hastings T and Cutler D (1973). An experimental implementation of the kernel/domain architecture, ACM SIGOPS Operating Systems Review, 7:4, (8-21), Online publication date: 1-Oct-1973.
  140. Hansen P (1973). Operating system principles, 10.5555/540365, Online publication date: 1-Jan-1973.
  141. ACM
    Spier M, Hastings T and Cutler D An experimental implementation of the kernel/domain architecture Proceedings of the fourth ACM symposium on Operating system principles, (8-21)
  142. ACM
    Wolman B Debugging PL/I programs in the multics environment Proceedings of the December 5-7, 1972, fall joint computer conference, part I, (507-514)
  143. ACM
    Corbató F, Saltzer J and Clingen C Multics Proceedings of the May 16-18, 1972, spring joint computer conference, (571-583)
Contributors
  • The University of Utah

Recommendations