Journal: Operating Systems Review

Volume 32, Issue 4

3 -- 8Geoffrey M. Voelker. Report on the SIGMETRICS 98/PERFORMANCE 98 Joint International Conference on Measuerment and Modeling of Computer Systems
9 -- 20Ross J. Anderson, Francesco Bergadano, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Roger M. Needham. A New Family of Authentication Protocols
21 -- 24Chris J. Mitchell, Chan Yeob Yeun. Fixing a Problem in the Helsinki Protocol
25 -- 32Danai Patiyoot, S. J. Shepherd. Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks
33 -- 39Marc Joye, Sung-Ming Yen. ID-based Secret-Key Cryptography
40 -- 46Bernhard Wagner. Controlling Cgi Programs
47 -- 61Winfried E. Kühnhauser. A Classification of Interdomain Actions
62 -- 69Stein Jørgen Ryan. Synchronization in Portable Device Drivers
70 -- 76Xiaohui Wei, Jiubin Ju. SFT: A Consistent Checkpointing Algorithm With Shorter Freezing Time
77 -- 80Steven Robbins. Introducing Empirical Investigation in Undergraduate Operating Systems

Volume 32, Issue 3

1 -- 2William M. Waite. Is Operating Systems Review Obsolete?
7 -- 20Shouhuai Xu, Gendu Zhang, Hong Zhu. On the Security of Three-Party Cryptographic Protocols
21 -- 29Amjad Mahmood. Task Allocation in Distributed Computing Systems
30 -- 50Sung-Il Kang, Heung-Kyu Lee. Analysis and Solution of Non-preemptive Policies for Scheduling Readers and Writers
51 -- 54George Dimitoglou. Deadlocks and Methods for their Detection, Prevention and Recovery in Modern Operating Systems
55 -- 63Lu Sanglu, Xie Li. A Scalable Load Balancing System for NOWs
64 -- 71Zhonghua Yang, Chengzheng Sun. CORBA For Hard Real Time Applications: Some Critical Issues
72 -- 80Rajesh Bordawekar. A Case for Compositional File Systems (Extended Abstract)

Volume 32, Issue 2

1 -- 0William M. Waite. Is Operating Systems Review Obsolete?
2 -- 3Günter Haring, Christoph Lindemann, Martin Reiser. International Workshop Performance Evaluation - Origins and Directions
4 -- 15Marco de Vivo, Gabriela O. de Vivo, Germinal Isern. Internet Security Attacks at the Basic Levels
16 -- 32Stefanos Gritzalis, George Aggelis. Security Issues Surrounding Programming Languages for Mobile Code: Java vs. Safe-Tcl

Volume 32, Issue 1

1 -- 2Carla Schlatter Ellis. SIGOPS README
3 -- 22Edward A. Feustel, Terry Mayfield. The DGSA: Unmet Information Security Challenges for Operating System Designers
23 -- 28Birgit Pfitzmann, Michael Waidner. How to Break Fraud-Detectable Key Recovery
29 -- 40Theodore Faber. Optimizing Throughput in a Workstation-based Network File System over a High Bandwidth Local Area Network
41 -- 56Özalp Babaoglu, Renzo Davoli, Alberto Montresor, Roberto Segala. System Support for Partition-Aware Network Applications
57 -- 64Yanxiang He, Donald H. Cooley, Jianping Zhang. Planning Management of Multiagent-Based Distributed Open Computing Environment Model