ASOSI: Asymmetric Operating System Infrastructure
نویسنده
چکیده
At the present time, when the usage of super-computers has been brought into play and turned out to be more widespread, the research of Asymmetric Operating Systems has been gathering speed, because super-computers more often than not run an Asymmetric Operating System. In this paper some new algorithms and implementations designed in our group and based on our ASOSI framework are presented.
منابع مشابه
Implementation of an Agent-Oriented Trust Management Infrastructure Based on a Hybrid PKI Model
Access control in modern computing environments is different from access control in the traditional setting of operating systems. For distributed computing systems, specification and enforcement of permissions can be based on a public key infrastructure which deals with public keys for asymmetric cryptography. Previous approaches and their implementations for applying a public key infrastructur...
متن کاملScheduling Algorithms for Asymmetric Multi-core Processors
— Growing power dissipation due to high performance requirement of processor suggests multicore processor technology, which has become the technology for present and next decade. Research advocates asymmetric multi-core processor system for better utilization of chip real state. However, asymmetric multi core architecture poses a new challenge to operating system scheduler, which traditionally ...
متن کاملAn Operating System Architecture for Networked Server Infrastructure
AN OPERATING SYSTEM ARCHITECTURE FOR NETWORKED SERVER INFRASTRUCTURE
متن کاملStandards Competition and the Role of Intermediation in the Supply of Mobile Applications
The development of ubiquitous computing and mobile commerce is premised on an infrastructure of interoperable networks, operating systems and applications. As technologies evolve to create this infrastructure this process sometimes gives rise to a standards competition. This research examines such a competition between mobile application development platforms and the resulting intermediation se...
متن کاملA Way of Key Management in Cloud Storage Based on Trusted Computing
Cloud security has gained increasingly emphasis in the research community, with much focus primary concentrated on how to secure the operation system and virtual machine on which cloud system runs on. We take an alternative perspective to consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted b...
متن کامل