Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Butler W. Lampson is active.

Publication


Featured researches published by Butler W. Lampson.


Communications of The ACM | 1973

A note on the confinement problem

Butler W. Lampson

onfining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified.


ACM Transactions on Computer Systems | 1992

Authentication in distributed systems: theory and practice

Butler W. Lampson; Martín Abadi; Michael Burrows; Edward P. Wobber

We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a “speaks for” relation between principals. A simple principal either has a name or is a communication channel; a compound principal can express an adopted role or delegated authority. The theory shows how to reason about a principals authority by deducing the other principals that it can speak for; authenticating a channel is one important application. We use the theory to explain many existing and proposed security mechanisms. In particular, we describe the system we have built. It passes principals efficiently as arguments or results of remote procedure calls, and it handles public and shared key encryption, name lookup in a large name space, groups of principals, program loading, delegation, access control, and revocation.


ACM Transactions on Programming Languages and Systems | 1993

A calculus for access control in distributed systems

Martín Abadi; Michael Burrows; Butler W. Lampson; Gordon D. Plotkin

We study some of the concepts, protocols, and algorithms for access control in distributed systems, from a logical perspective. We account for how a principal may come to believe that another principal is making a request, either on his own or on someone elses behalf. We also provide a logical language for accesss control lists and theories for deciding whether requests should be granted.


Communications of The ACM | 1980

Experience with processes and monitors in Mesa

Butler W. Lampson; David D. Redell

The use of monitors for describing concurrency has been much discussed in the literature. When monitors are used in real systems of any size, however, a number of problems arise which have not been adequately dealt with: the semantics of nested monitor calls; the various ways of defining the meaning of WAIT; priority scheduling; handling of timeouts, aborts and other exceptional conditions; interactions with process creation and destruction; monitoring large numbers of small objects. These problems are addressed by the facilities described here for concurrent programming in Mesa. Experience with several substantial applications gives us some confidence in the validity of our solutions.


symposium on operating systems principles | 1994

Authentication in the Taos operating system

Edward P. Wobber; Martín Abadi; Michael Burrows; Butler W. Lampson

We describe a design and implementation of security for a distributed system. In our system, applications access security services through a narrow interface. This interface provides a notion of identity that includes simple principals, groups, roles, and delegations. A new operating system component manages principals, credentials, and secure channels. It checks credentials according to the formal rules of a logic of authentication. Our implementation is efficient enough to support a substantial user community.


IEEE Software | 1984

Hints for Computer System Design

Butler W. Lampson

Decorated with pithy quotations from many sources, this collection of good advice and anecdotes draws upon the folk wisdom of experienced designers.


Science of Computer Programming | 1993

Authentication and delegation with smart-cards

Martín Abadi; Michael Burrows; Charles W. Kaufman; Butler W. Lampson

The authentication of users in distributed systems poses special problems because users lack the ability to encrypt and decrypt. The same problems arise when users wish to delegate some of their authority to nodes, after mutual authentication.


IEEE Computer | 2003

A trusted open platform

Paul England; Butler W. Lampson; John L. Manferdelli; B. Willman

Microsofts next-generation secure computing base extends personal computers to offer mechanisms that let high-assurance software protect itself from the operating systems, device drivers, BIOS, and other software running on the same machine.


IEEE Computer | 2004

Computer security in the real world

Butler W. Lampson

Most computers today are insecure because security is costly in terms of user inconvenience and foregone features, and people are unwilling to pay the price. Real-world security depends more on punishment than on locks, but its hard to even find network attackers, much less punish them. The basic elements of security are authentication, authorization, and auditing: the gold standard. The idea of one principal speaking for another is the key to doing these uniformly across the Internet.


principles of distributed computing | 1986

Designing a global name service

Butler W. Lampson

A name service maps a name of an individual, organization or facility into a set of labeled properties, each of which is a string. It is the basis for resource location, mail addressing, and authentication in a distributed computing system. The global name service described here is meant to do this for billions of names distributed throughout the world. It addresses the problems of high availability, large size, continuing evolution, fault isolation and lack of global trust. The non-deterministic behavior of the service is specified rather precisely to allow a wide range of client and server implementations.

Collaboration


Dive into the Butler W. Lampson's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ronald L. Rivest

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Edward P. Wobber

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge