{"title":"Algorithms for Data Encryption","authors":"W. Müller","doi":"10.1007/978-1-4471-3178-6_7","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_7","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124849285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing 128 Bit Persistent Addresses on 80x86 Processors","authors":"W. Cockshott, P. Foulk","doi":"10.1007/978-1-4471-3178-6_9","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_9","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"42 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131574734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Persistence for Arbitrary C++ Data Structures","authors":"Frances Paulisch, S. Manke, W. Tichy","doi":"10.1007/978-1-4471-3178-6_26","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_26","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115943213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. L. Brown, R. Morrison, David S. Munro, A. Dearle, J. Rosenberg
{"title":"A Layered Persistent Architecture for Napier88","authors":"A. L. Brown, R. Morrison, David S. Munro, A. Dearle, J. Rosenberg","doi":"10.1007/978-1-4471-3178-6_11","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_11","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Persistent Languages and Architectures","authors":"R. Morrison, M. Atkinson","doi":"10.1007/978-1-4471-3178-6_2","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_2","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134402158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure RISC-based Architecture Supporting Data Persistence","authors":"D. Koch, J. Rosenberg","doi":"10.1007/978-1-4471-3178-6_13","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_13","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Considerations of Persistence and Security in Choices, an Object-Oriented Operating System","authors":"R. Campbell, P. Madany","doi":"10.1007/978-1-4471-3178-6_20","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_20","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117271332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capabilities and Encryption: The Ultimate Defense Against Security Attacks ?","authors":"Bernd Freisleben, P. Kammerer, J. L. Keedy","doi":"10.1007/978-1-4471-3178-6_8","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_8","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"112 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The RelaX Transactional Object Management System","authors":"R. Kroeger, M. Mock, R. Schumann","doi":"10.1007/978-1-4471-3178-6_24","DOIUrl":"https://doi.org/10.1007/978-1-4471-3178-6_24","url":null,"abstract":"","PeriodicalId":214708,"journal":{"name":"Security and Persistence","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121636338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}