{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:47:31Z","timestamp":1725662851525},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540087557"},{"type":"electronic","value":"9783540358800"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1978]]},"DOI":"10.1007\/3-540-08755-9_4","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T16:32:32Z","timestamp":1330187552000},"page":"99-208","source":"Crossref","is-referenced-by-count":15,"title":["Naming and binding of objects"],"prefix":"10.1007","author":[{"given":"J. H.","family":"Saltzer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,25]]},"reference":[{"key":"4_CR1","volume-title":"Computer Structures","author":"C. G. Bell","year":"1971","unstructured":"Bell, C.G., and Newell, A., Computer Structures, McGraw-Hill, New York (1971)."},{"issue":"4","key":"4_CR2","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1145\/355602.361306","volume":"15","author":"A. Bensoussan","year":"1972","unstructured":"Bensoussan, A., Clingen, C.T., and Daley, R.C., \"The Multics virtual memory: concepts and design,\" CACM 15, 4 (May, 1972), pp. 308\u2013318.","journal-title":"CACM"},{"key":"4_CR3","unstructured":"Bratt, R.G., \"Minimizing the Naming Facilities Requiring Protection in a Computing Utility,\" S.M. Thesis, M.I.T. Dep't of Elec. Eng. and Comp. Sci. (Sept., 1976). (Also available as M.I.T. Lab. for Comp. Sci. Technical Report TR-156.)"},{"key":"4_CR4","unstructured":"Carlson, W.E., and Crocker, S.D., \"The impact of networks on the (E) software marketplace,\" Proc. IEEE Electronics and Aerospace Convention (EASCON 1974), pp. 304\u2013308."},{"key":"4_CR5","unstructured":"Clingen, C.T., \"Program naming problems in a shared tree-structured hierarchy,\" NATO Science Committee Conference on Techniques in Software Engineering 1, Rome (October 27, 1969)."},{"key":"4_CR6","unstructured":"CODASYL (Anonymous), Data Base Task Group Report, Association for Computing Machinery, New York (1971)."},{"key":"4_CR7","volume-title":"The Compatible Time-Sharing System: A Programmer's Guide","year":"1965","unstructured":"Crisman, P., Ed., The Compatible Time-Sharing System: A Programmer's Guide, 2nd ed., M.I.T. Press, Cambridge (1965).","edition":"2nd ed."},{"issue":"5","key":"4_CR8","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1145\/363095.363139","volume":"11","author":"R. C. Daley","year":"1968","unstructured":"Daley, R.C., and Dennis, J.B., \"Virtual memory, processes, and sharing in Multics,\" CACM 11, 5 (May, 1968), pp. 306\u2013312.","journal-title":"CACM"},{"issue":"4","key":"4_CR9","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1145\/321296.321310","volume":"12","author":"J. B. Dennis","year":"1965","unstructured":"Dennis, J.B., \"Segmentation and the design of multiprogrammed computer systems,\" JACM 12, 4 (October, 1965), pp. 589\u2013602.","journal-title":"JACM"},{"issue":"7","key":"4_CR10","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1145\/361011.361070","volume":"17","author":"R. S. Fabry","year":"1974","unstructured":"Fabry, R.S., \"Capability-based addressing,\" CACM 17, 7 (July, 1974), pp. 403\u2013412.","journal-title":"CACM"},{"key":"4_CR11","volume-title":"APL\\360: User's Manual","author":"A. D. Falkoff","year":"1968","unstructured":"Falkoff, A.D., and Iverson, K.E., APL\\360: User's Manual. IBM Corporation, White Plains, New York (1968)."},{"key":"4_CR12","unstructured":"Farber, D.J., et al., \"The distributed computing system,\" Proc. 7th IEEE Computer Society Conf. (COMPCON 73), pp. 31\u201334."},{"issue":"6","key":"4_CR13","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1145\/362604.362615","volume":"14","author":"A. G. Fraser","year":"1971","unstructured":"Fraser, A.G., \"On the meaning of names in programming systems,\" CACM 14, 6 (June, 1971), pp. 409\u2013416.","journal-title":"CACM"},{"key":"4_CR14","unstructured":"Henderson, D.A., Jr., \"The binding model: A semantic base for modular programming systems,\" Ph.D. thesis, M.I.T. Dep't of Elec. Eng. and Comp. Sci. (February, 1975). (Also available as M.I.T. Project MAC Technical Report TR-145.)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Henderson, P., and Morris, J.H., \"A Lazy Evaluator,\" Proc. 3rd ACM Symposium on Principles of Programming Languages, (January, 1976), pp. 95\u2013103.","DOI":"10.1145\/800168.811543"},{"issue":"10","key":"4_CR16","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/366786.366795","volume":"4","author":"A. Holt","year":"1961","unstructured":"Holt, A., \"Program organization and record keeping for dynamic storage allocation,\" CACM 4, 10 (Oct., 1961), pp. 422\u2013431.","journal-title":"CACM"},{"key":"4_CR17","unstructured":"IBM (Anonymous) Reference Manual: 709\/7090 FORTRAN Operations. IBM Corporation, White Plains, New York (1961). C28-6066"},{"key":"4_CR18","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1093\/comjnl\/5.3.200","volume":"5","author":"J. Iliffe","year":"1962","unstructured":"Iliffe, J., and Jodeit, \"A dynamic storage allocation scheme,\" Computer Journal 5, (Oct., 1962), pp. 200\u2013209.","journal-title":"Computer Journal"},{"key":"4_CR19","unstructured":"Janson, P.A., \"Removing the Dynamic Linker from the Security Kernel of a Computing Utility,\" S.M. Thesis, M.I.T. Dep't of Elec. Eng. and Comp. Sci. (June, 1974). (Also available as M.I.T. Project MAC Technical Report TR-132.)"},{"key":"4_CR20","unstructured":"Janson, P.A., \"Using type extension to organize virtual memory mechanisms,\" Ph.D. Thesis, M.I.T. Dep't of Elec. Eng. and Comp. Sci. (Sept., 1976). (Also available as M.I.T. Lab. for Comp. Sci. Technical Report TR-167.)"},{"key":"4_CR21","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TEC.1962.5219356","volume":"2","author":"Kilburn","year":"1962","unstructured":"Kilburn, et al.. \"One-Level Storage System,\" IRE Trans. on Elec. Computers EC-11, 2 (April, 1962), pp. 223\u2013235.","journal-title":"IRE Trans. on Elec. Computers EC-11"},{"key":"4_CR22","unstructured":"Knuth, D., The Art of Computer Programming, Volume 1\/Fundamental Algorithms, Addison Wesley, Reading, Mass. (1968), Chapter 2."},{"issue":"5","key":"4_CR23","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/360051.360074","volume":"19","author":"B. W. Lampson","year":"1976","unstructured":"Lampson, B.W., and Sturgis, H.E., \"Reflections on an operating system design,\" CACM 19, 5 (May, 1976), pp. 251\u2013265.","journal-title":"CACM"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Moses, J., \"The function of FUNCTION in LISP,\" SIGSAM Bulletin (July, 1970), pp. 13\u201327.","DOI":"10.1145\/1093410.1093411"},{"issue":"I","key":"4_CR25","first-page":"23","volume":"41","author":"D. L. Murphy","year":"1972","unstructured":"Murphy, D.L., \"Storage organization and management in TENEX,\" AFIPS Conf. Proc. 41 I (FJCC, 1972), pp. 23\u201332.","journal-title":"AFIPS Conf. Proc."},{"issue":"I","key":"4_CR26","first-page":"571","volume":"41","author":"R. Needham","year":"1972","unstructured":"Needham, R., \"Protection systems and protection implementation,\" AFIPS Conf. Proc. 41 I (FJCC, 1972), pp. 571\u2013578.","journal-title":"AFIPS Conf. Proc."},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Needham, R.M., and Birrell, A.D., \"The CAP filing system,\" Proc. 6th ACM Symposium on Operating Systems Principles (November, 1977), pp. 11\u201316.","DOI":"10.1145\/800214.806542"},{"key":"4_CR28","volume-title":"The Multics System: an Examination of its Structure","author":"E. I. Organick","year":"1972","unstructured":"Organick, E.I., The Multics System: an Examination of its Structure, M.I.T. Press, Cambridge (1972)."},{"key":"4_CR29","volume-title":"Computer System Organization, The B5700\/B6700 Series","author":"E. I. Organick","year":"1973","unstructured":"Organick, E.I., Computer System Organization, The B5700\/B6700 Series, Academic Press, New York (1973)."},{"key":"4_CR30","unstructured":"Radin, G., and Schneider, P.R., \"An architecture for an extended machine with protected addressing,\" IBM Poughkeepsie Lab Technical Report TR 00.2757 (May, 1976)."},{"key":"4_CR31","unstructured":"Redell, D.D., \"Naming and protection in extendible operating systems,\" Ph.D. Thesis, Univ. of Cal. at Berkeley, (Sept., 1974). (Also available as M.I.T. Project MAC Technical Report TR-140.)"},{"issue":"7","key":"4_CR32","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1145\/361011.361061","volume":"17","author":"D. M. Ritchie","year":"1974","unstructured":"Ritchie, D.M., and Thompson, K., \"The UNIX time-sharing system,\" CACM 17, 7 (July, 1974), pp. 365\u2013375.","journal-title":"CACM"},{"issue":"3","key":"4_CR33","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1145\/361268.361275","volume":"15","author":"M. D. Schroeder","year":"1972","unstructured":"Schroeder, M.D., and Saltzer, J.H., \"A hardware architecture for implementing protection rings,\" CACM 15, 3 (Mar., 1972), pp. 157\u2013170.","journal-title":"CACM"},{"key":"4_CR34","first-page":"159","volume":"42","author":"R. H. Thomas","year":"1973","unstructured":"Thomas, R.H., \"A resource sharing executive for the ARPANET,\" AFIPS Conf. Proc. 42 (1973 NCC), pp. 159\u2013163.","journal-title":"AFIPS Conf. Proc."},{"key":"4_CR35","volume-title":"Timesharing System Design Concepts","author":"R. W. Watson","year":"1974","unstructured":"Watson, R.W., Timesharing System Design Concepts, McGraw-Hill New York (1974)."},{"issue":"6","key":"4_CR36","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1145\/355616.364017","volume":"17","author":"W. Wulf","year":"1974","unstructured":"Wulf, W., et al., \"HYDRA: The kernel of a multiprocessor operating system,\" CACM 17, 6 (June, 1974), pp. 337\u2013345.","journal-title":"CACM"}],"container-title":["Lecture Notes in Computer Science","Operating Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-08755-9_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:59:52Z","timestamp":1605643192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-08755-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1978]]},"ISBN":["9783540087557","9783540358800"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/3-540-08755-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1978]]}}}