{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:00Z","timestamp":1750309560569,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3723851.3723854","type":"proceedings-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T03:42:19Z","timestamp":1745379739000},"page":"38-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Cloud-Scale Distributed Capabilities"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3609-4698","authenticated-orcid":false,"given":"Otto","family":"White","sequence":"first","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0713-4036","authenticated-orcid":false,"given":"Yaoxin","family":"Jing","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6872-6525","authenticated-orcid":false,"given":"Adrien","family":"Ghosn","sequence":"additional","affiliation":[{"name":"Microsoft Azure Research, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9543-567X","authenticated-orcid":false,"given":"Michael","family":"Steiner","sequence":"additional","affiliation":[{"name":"Intel Labs, Hillsboro, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6983-0630","authenticated-orcid":false,"given":"Anjo","family":"Vahldiek-Oberwagner","sequence":"additional","affiliation":[{"name":"Intel Labs, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5309-0391","authenticated-orcid":false,"given":"Mona","family":"Vij","sequence":"additional","affiliation":[{"name":"Intel Labs, Hillsboro, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1452-840X","authenticated-orcid":false,"given":"Lluis","family":"Vilanova","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,4,19]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"[n. d.]. Machine Learning Service - Amazon Sagemaker AI - AWS. https:\/\/aws.amazon.com\/sagemaker-ai\/."},{"key":"e_1_3_3_1_3_2","unstructured":"[n. d.]. Vertex AI Studio. https:\/\/cloud.google.com\/generative-ai-studio."},{"key":"e_1_3_3_1_4_2","unstructured":"Microsoft Azure. 2025. Azure OpenAI Service. https:\/\/azure.microsoft.com\/en-us\/products\/ai-services\/openai-service"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01741-4"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629579"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3131209"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"James\u00a0C. Corbett Jeffrey Dean Michael Epstein Andrew Fikes Christopher Frost J.\u00a0J. Furman Sanjay Ghemawat Andrey Gubarev Christopher Heiser Peter Hochschild Wilson Hsieh Sebastian Kanthak Eugene Kogan Hongyi Li Alexander Lloyd Sergey Melnik David Mwaura David Nagle Sean Quinlan Rajesh Rao Lindsay Rolig Yasushi Saito Michal Szymaniak Christopher Taylor Ruth Wang and Dale Woodford. 2013. Spanner: Google\u2019s Globally Distributed Database. ACM Trans. Comput. Syst. 31 3 (Aug. 2013) 8:1\u20138:22. 10.1145\/2491245","DOI":"10.1145\/2491245"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2903741"},{"key":"e_1_3_3_1_10_2","volume-title":"Software Engineering Research and Practice","author":"Elliott Aaron","year":"2010","unstructured":"Aaron Elliott and S. Knight. 2010. Role Explosion: Acknowledging the Problem. In Software Engineering Research and Practice."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304013"},{"key":"e_1_3_3_1_12_2","unstructured":"Simon Gerber. 2018. Authorization Protection and Allocation of Memory in a Large System. (2018)."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Gernot Heiser and Kevin Elphinstone. 2016. L4 Microkernels: The Lessons from 20 Years of Research and Deployment. ACM Transactions on Computer Systems 34 1 (April 2016) 1\u201329. 10.1145\/2893177","DOI":"10.1145\/2893177"},{"key":"e_1_3_3_1_14_2","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Hille Matthias","year":"2019","unstructured":"Matthias Hille, Nils Asmussen, Pramod Bhatotia, and Hermann H\u00e4rtig. 2019. SemperOS: A Distributed Capability System. In USENIX Annual Technical Conference (ATC)."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.42"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524508"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_26"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.5555\/538134"},{"key":"e_1_3_3_1_19_2","volume-title":"Capability Myths Demolished","author":"Miller Mark\u00a0S.","year":"2003","unstructured":"Mark\u00a0S. Miller, Ka-Ping Yee, and Jonathan\u00a0S. Shapiro. 2003. Capability Myths Demolished. Technical Report SRL2003-02. John Hopkins University."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"S.\u00a0J. Mullender and A.\u00a0S. Tanenbaum. 1986. The Design of a Capability-Based Distributed Operating System. Comput. J. 29 4 (Jan. 1986) 289\u2013299. 10.1093\/comjnl\/29.4.289","DOI":"10.1093\/comjnl\/29.4.289"},{"key":"e_1_3_3_1_21_2","volume-title":"USENIX Conference on Networked Systems Design and Implementation","author":"Nishtala Rajesh","year":"2013","unstructured":"Rajesh Nishtala, Hans Fugal, Steven Grimm, Marc Kwiatkowski, Herman Lee, Harry\u00a0C. Li, Ryan McElroy, Mike Paleczny, Daniel Peek, Paul Saab, David Stafford, Tony Tung, and Venkateshwaran Venkataramani. 2013. Scaling Memcache at Facebook. In USENIX Conference on Networked Systems Design and Implementation."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.18"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"J.H. Saltzer and M.D. Schroeder. 1975. The Protection of Information in Computer Systems. Proc. IEEE 63 9 (Sept. 1975) 1278\u20131308. 10.1109\/PROC.1975.9939","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132465.3132470"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359805"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613156"},{"key":"e_1_3_3_1_28_2","unstructured":"Andrew\u00a0S Tanenbaum Sape\u00a0J Mullender and Robbert van Renesse. 1995. Using Sparse Capabilities in a Distributed Operating System. (1995)."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3056101"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519569"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00098"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358288"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00191"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","unstructured":"Zhongyuan Xu and Scott\u00a0D. Stoller. 2015. Mining Attribute-Based Access Control Policies. IEEE Transactions on Dependable and Secure Computing 12 5 (Sept. 2015) 533\u2013545. 10.1109\/TDSC.2014.2369048","DOI":"10.1109\/TDSC.2014.2369048"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"}],"event":{"name":"HCDS '25: 4th Workshop on Heterogeneous Composable and Disaggregated Systems","acronym":"HCDS '25","location":"Rotterdam Netherlands"},"container-title":["Proceedings of the 4th Workshop on Heterogeneous Composable and Disaggregated Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723851.3723854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723851.3723854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:19:00Z","timestamp":1750295940000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723851.3723854"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":36,"alternative-id":["10.1145\/3723851.3723854","10.1145\/3723851"],"URL":"https:\/\/doi.org\/10.1145\/3723851.3723854","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}