{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T03:50:47Z","timestamp":1727063447591},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540087557"},{"type":"electronic","value":"9783540358800"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1978]]},"DOI":"10.1007\/3-540-08755-9_13","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T11:32:43Z","timestamp":1330169563000},"page":"583-593","source":"Crossref","is-referenced-by-count":2,"title":["Research problems of decentralized systems with largely autonomous nodes"],"prefix":"10.1007","author":[{"given":"J. H.","family":"Saltzer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,25]]},"reference":[{"key":"13_CR1","unstructured":"Alsberg, P.A., Belford, G.G., Day, J.D., and Grapa, E., \"Multi-Copy Resiliency Techniques,\" University of Illinois Center for Advanced Computation Document #202, May, 1976."},{"key":"13_CR2","unstructured":"Arvind, et al., \"Programming in a viable data flow language,\" Univ. of Calif. (Irvine) Department of Information and Computer Science, Technical Report 89."},{"key":"13_CR3","unstructured":"Bishop, P.B., \"Computer Systems with a Very Large Address Space and Garbage Collection,\" Ph.D. thesis, M.I.T. Department of Electrical Engineering and Computer Science, May, 1977, also Laboratory for Computer Science Technical Report TR-178."},{"key":"13_CR4","unstructured":"Branstad, D.K., \"Encryption Protection in Computer Data Communications,\" Proc. Fourth Data Communications Symposium, Quebec, October, 1975, pp. 8.1\u20138.7."},{"issue":"5","key":"13_CR5","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/TCOM.1974.1092259","volume":"22","author":"V. G. Cerf","year":"1974","unstructured":"Cerf, V.G., and Kahn, R.E., \"A Protocol for Packet Network Interconnection,\" IEEE Trans. on Communications 22, 5 (May, 1974) pp. 637\u2013648.","journal-title":"IEEE Trans. on Communications"},{"key":"13_CR6","unstructured":"d'Oliveira, C., \"A Conjecture About Computer Decentralization,\" B.S. thesis, M.I.T. Department of Electrical Engineering and Computer Science, August, 1977."},{"key":"13_CR7","unstructured":"Dennis, J.B., \"First Version of a Data Flow Procedure Language,\" M.I.T. Laboratory for Computer Science Technical Memo TM-61, May, 1975."},{"issue":"6","key":"13_CR8","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., and Hellman, M.E., \"New Directions in Cryptography,\" IEEE Trans. on Info. Theory 22, 6 (November, 1976) pp. 644\u2013654.","journal-title":"IEEE Trans. on Info. Theory"},{"key":"13_CR9","volume-title":"\"A Distributed Capability Computing System (DCCS),\" ARPANET Request for Comments #712","author":"J. E. Donnelley","year":"1976","unstructured":"Donnelley, J.E., \"A Distributed Capability Computing System (DCCS),\" ARPANET Request for Comments #712, Network Information Center, Stanford Research Institute, Menlo Park, California, February, 1976."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Ellis, C.A., \"Consistency and Correctness of Duplicate Database Systems,\" Sixth ACM Symposium on Operating System Principles, November, 1977, pp. 67\u201384.","DOI":"10.1145\/800214.806548"},{"issue":"11","key":"13_CR11","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1145\/360363.360369","volume":"19","author":"K. P. Eswaran","year":"1976","unstructured":"Eswaran, K.P., et al., \"The Notions of Consistency and Predicate Locks in a Database System,\" Comm. of ACM 19, 11 (November, 1976) pp. 624\u2013633.","journal-title":"Comm. of ACM"},{"key":"13_CR12","unstructured":"Farber, D.J., and Heinrich, F.R., \"The Structure of a Distributed Computer System: The Distributed File System,\" Proc. First Int. Conf. on Computer Comm., 1972, pp. 364\u2013370."},{"key":"13_CR13","unstructured":"Feinler, E., and Postel, J., ARPANET Protocol Handbook, NIC 7104, Network Information Center, Stanford Research Institute, Menlo Park, California, April, 1976."},{"key":"13_CR14","unstructured":"Hewitt, C., \"Viewing Control Structures as Patterns of Passing Messages,\" to be published in A.I. Journal."},{"key":"13_CR15","unstructured":"Karger, P., \"Non-Discretionary Access Control for Decentralized Computing Systems,\" M.S. thesis, M.I.T. Department of Electrical Engineering and Computer Science, May, 1977, also Laboratory for Computer Science Technical Report TR-179."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Kent, S.T., \"Encryption-Based Protection Protocols for Interactive User-Computer Communication,\" S.M. thesis, M.I.T. Department of Electrical Engineering and Computer Science, May, 1976, also Laboratory for Computer Science Technical Report TR-162.","DOI":"10.1145\/800103.803345"},{"key":"13_CR17","unstructured":"Lamport, L., \"Time, Clocks, and the Ordering of Events in a Distributed System,\" Mass. Computer Associates Technical Report CA-7603-2911, March, 1976."},{"key":"13_CR18","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/BF00265219","volume":"7","author":"L. Lamport","year":"1976","unstructured":"Lamport, L., \"The Synchronization of Independent Processes,\" Acta Informatica, 7, 1976, pp. 15\u201334.","journal-title":"Acta Informatica"},{"key":"13_CR19","unstructured":"Lampson, B., and Sturgis, H., \"Crash Recovery in a Distributed Data Storage System,\" to be published in the Comm. of ACM."},{"key":"13_CR20","unstructured":"Levine, P.H., \"Facilitating Interprocess Communication in a Heterogeneous Network Environment,\" S.M. thesis, M.I.T. Department of Electrical Engineering and Computer Science, June, 1977."},{"issue":"1","key":"13_CR21","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/TSE.1975.6312816","volume":"SE-1","author":"B. H. Liskov","year":"1975","unstructured":"Liskov, B.H., and Zilles, S., \"Specification Techniques for Data Abstraction,\" IEEE Trans. Software Engineering SE-1, 1, (1975) pp. 7\u201319.","journal-title":"IEEE Trans. Software Engineering"},{"issue":"8","key":"13_CR22","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1145\/359763.359789","volume":"20","author":"B. H. Liskov","year":"1977","unstructured":"Liskov, B.H., et al., \"Abstraction Mechanisms in CLU,\" Comm. of ACM 20, 8 (August, 1977), pp. 564\u2013576.","journal-title":"Comm. of ACM"},{"issue":"7","key":"13_CR23","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1145\/360248.360253","volume":"19","author":"R. M. Metcalfe","year":"1976","unstructured":"Metcalfe, R.M., and Boggs, D.R., \"Ethernet: Distributed Packet Switching for Local Computer Networks,\" Comm. of ACM 19, 7 (July, 1976) pp. 395\u2013404.","journal-title":"Comm. of ACM"},{"key":"13_CR24","unstructured":"Millstein, R.E., \"Second Semi-Annual Report,\" Massachusetts Computer Associates Report CADD-7608-1611, August, 1976."},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Montgomery, W., \"Measurements of Sharing in Multics,\" Sixth ACM Symposium on Operating Systems Principles, November, 1977, pp. 85\u201390.","DOI":"10.1145\/800214.806549"},{"key":"13_CR26","unstructured":"Reed, D.P., and Kanodia, R.J., \"Synchronization with Eventcounts and Sequencers,\" to appear in the Comm. of ACM."},{"key":"13_CR27","unstructured":"Rothnie, J.B., et al., \"The Redundant Update Methodology of SDD-1: A System for Distributed Databases,\" Computer Corporation of America Report CCA-77-02, February, 1977."},{"key":"13_CR28","unstructured":"Rowe, L.A., Hopwood, M.D., and Farber, D.J., \"Software Methods for Achieving Fail-Soft Behavior in the Distributed Computing System,\" Proc. IEEE Symposium on Computer Software Reliability, 1973, pp. 7\u201311."},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Stearns, R.E., et al., \"Concurrency Control for Database Systems,\" extended abstract, IEEE Symposium on Foundations of Computer Science, CH1133-8 C, October, 1976, pp. 19\u201332.","DOI":"10.1109\/SFCS.1976.12"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Thomas, R.H., \"A Resource Sharing Executive for the ARPANET,\" Proc. AFIPS Nat. Comp. Conf., 1973, pp. 155\u2013163.","DOI":"10.21236\/AD0758162"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Thomas, R.H., \"A Solution to the Update Problem for Multiple Copy Data Bases Which Use Distributed Control,\" Bolt Beranek and Newman Report #3340, July, 1976.","DOI":"10.21236\/ADA028251"},{"issue":"4","key":"13_CR32","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TSE.1976.233830","volume":"SE-2","author":"W. A. Wulf","year":"1976","unstructured":"Wulf, W.A., et al., \"An Introduction to the Construction and Verification of Alphard Programs,\" IEEE Trans. on Software Engineering SE-2, 4 (December, 1976) pp. 253\u2013265.","journal-title":"IEEE Trans. on Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Operating Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-08755-9_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:59:50Z","timestamp":1605625190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-08755-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1978]]},"ISBN":["9783540087557","9783540358800"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/3-540-08755-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1978]]}}}