Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Charles S. Kline is active.

Publication


Featured researches published by Charles S. Kline.


symposium on operating systems principles | 1983

The LOCUS distributed operating system

Bruce J. Walker; Gerald J. Popek; Robert English; Charles S. Kline; Greg Thiel

LOCUS is a distributed operating system which supports transparent access to data through a network wide filesystem, permits automatic replication of storage, supports transparent distributed process execution, supplies a number of high reliability functions such as nested transactions, and is upward compatible with Unix. Partitioned operation of subnets and their dynamic merge is also supported. The system has been operational for about two years at UCLA and extensive experience in its use has been obtained. The complete system architecture is outlined in this paper, and that experience is summarized.


IEEE Transactions on Software Engineering | 1983

Detection of Mutual Inconsistency in Distributed Systems

Douglas Stott Parker; Gerald J. Popek; Gerard Rudisin; Allen Stoughton; Bruce J. Walker; Evelyn Walton; Johanna M. Chow; David A. Edwards; Stephen Kiser; Charles S. Kline

Many distributed systems are now being developed to provide users with convenient access to data via some kind of communications network. In many cases it is desirable to keep the system functioning even when it is partitioned by network failures. A serious problem in this context is how one can support redundant copies of resources such as files (for the sake of reliability) while simultaneously monitoring their mutual consistency (the equality of multiple copies). This is difficult since network faiures can lead to inconsistency, and disrupt attempts at maintaining consistency. In fact, even the detection of inconsistent copies is a nontrivial problem. Naive methods either 1) compare the multiple copies entirely or 2) perform simple tests which will diagnose some consistent copies as inconsistent. Here a new approach, involving version vectors and origin points, is presented and shown to detect single file, multiple copy mutual inconsistency effectively. The approach has been used in the design of LOCUS, a local network operating system at UCLA.


symposium on operating systems principles | 1981

LOCUS a network transparent, high reliability distributed system

Gerald J. Popek; Bruce J. Walker; Johanna M. Chow; David A. Edwards; Charles S. Kline; Gerard Rudisin; Greg Thiel

LOCUS is a distributed operating system that provides a very high degree of network transparency while at the same time supporting high performance and automatic replication of storage. By network transparency we mean that at the system call interface there is no need to mention anything network related. Knowledge of the network and code to interact with foreign sites is below this interface and is thus hidden from both users and programs under normal conditions. LOCUS is application code compatible with Unix2, and performance compares favorably with standard, single system Unix. LOCUS runs on a high bandwidth, low delay local network. It is designed to permit both a significant degree of local autonomy for each site in the network while still providing a network-wide, location independent name structure. Atomic file operations and extensive synchronization are supported. Small, slow sites without local mass store can coexist in the same network with much larger and more powerful machines without larger machines being slowed down through forced interaction with slower ones. Graceful operation during network topology changes is supported.


ACM Computing Surveys | 1979

Encryption and Secure Computer Networks

Gerald J. Popek; Charles S. Kline

There is increasing growth in the number of computer networks in use and in the kinds of distributed computing applications available on these networks This increase, together with concern about privacy, security, and integrity of information exchange, has created considerable interest in the use of encryptlon to protect information in the networks This survey is directed at the reader who ts knowledgeable about varmus network designs and who now wishes to consider incorporating encryption methods into these designs. It is also directed at developers of encryption algorithms who wish to understand the characteristics of such algorithms useful in network applications. Key management, network encryption protocols, digital signatures, and the utility of conventionalor public-key encryptlon methods are each discussed. A case study of how encryption was integrated into an actual network, the Arpanet, illustrates many issues present m the design of a network encryption facdity.


symposium on operating systems principles | 1975

The PDP-11 virtual machine architecture: A case study

Gerald J. Popek; Charles S. Kline

At UCLA, a virtual machine system prototype has been constructed for the Digital Equipment Corporation PDP-11/45. In order to successfully implement that system, a number of hardware changes have been necessary. Some overcome basic inadequacies in the original hardware for this purpose, and others enhance the performance of the virtual machine software. Steps in the development of the modified hardware architecture, as well as relevant aspects of the software structure, are discussed. In addition, a case study of interactions between hardware and software developments is presented, together with conclusions motivated by that experience.


the international conference | 1975

A verifiable protection system

Gerald J. Popek; Charles S. Kline

This paper reports on the design and implementation of the UCLA Virtual Machine System, a multiuser operating system base that has been developed to provide ultra high reliability protection and security. Details are presented of the UCLA-VM system, a prototype of which now exists. Concepts which have influenced its structure are discussed, including program verification, security kernels, virtual machines, virtual memory, and the need for flexible information sharing facilities. A new mechanism, capability faulting, is developed in order to remove much of the virtual memory support from the security kernel. Flexible, reliable control of sharing is obtained by extensions to several of these concepts, especially through the use of levels of kernels.


Advances in Computers | 1978

Issues in Kernel Design

Gerald J. Popek; Charles S. Kline

Considerable activity recently has been devoted to the design and development of operating system kernels, as part of efforts to provide much more reliably secure systems than heretofore available. The resulting kernel architectures differ substantially from more traditional systems of similar function and, in particular, appear superior with respect to reliability, simplicity, and security.


national computer conference | 1974

Verifiable secure operating system software

Gerald J. Popek; Charles S. Kline


afips | 1899

UCLA Secure UNIX

Gerald J. Popek; Mark Kampe; Charles S. Kline; Allen Stoughton; Michael Urban; Evelyn Walton


afips | 1899

Issues in kernel design

Gerald J. Popek; Charles S. Kline

Collaboration


Dive into the Charles S. Kline's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gerard Rudisin

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Greg Thiel

University of California

View shared research outputs
Top Co-Authors

Avatar

Robert English

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge