Classic Operating Systems 2001
DOI: 10.1007/978-1-4757-3510-9_20
|View full text |Cite
|
Sign up to set email alerts
|

Pilot: An Operating System for a Personal Computer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2001
2001
2001
2001

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…For example, the operating system Pilot [9] used a safe language [6] in a single address space to provide security without a kernel. Various approaches of software-based protection has recently been reconsidered in the context of Java [12].…”
Section: Related Workmentioning
confidence: 99%
“…For example, the operating system Pilot [9] used a safe language [6] in a single address space to provide security without a kernel. Various approaches of software-based protection has recently been reconsidered in the context of Java [12].…”
Section: Related Workmentioning
confidence: 99%
“…None of them, however, provides strong resource controls. Pilot [30] and Cedar [36] were two of the earliest language-based systems. Their development at Xerox PARC predates a flurry of research in the 1990's on such systems.…”
Section: Extensible Operating Systemsmentioning
confidence: 99%
“…It employs both static and run-time measures to avoid operations that are potentially harmful. Systems that use safe languages for system extensions include Pilot [70], which runs programs written in Mesa, HotJava Web Browser, which can be extended with applets written in Java, and the SPIN extensible OS [7], which can be extended with modules written in Modula 3.…”
Section: Hybrid Techniquesmentioning
confidence: 99%
“…The first trend is dynamic extensibility, where a trusted host is extended by importing and executing untrusted foreign code. For example, web browsers download plug-ins [65,83]; databases load type-specific extensions for storing and querying unconventional data [40,82]; operating systems load customized policies, general functionality [7,26,55,66,70,75,80,85], and performance-measurement code [85]. Operating systems can download part of an application into the kernel so that the application can perform better.…”
Section: Introductionmentioning
confidence: 99%