Making Untrusted Code Useful

Butler Lampson

 

Citation: Technical perspective: Making untrusted code useful, Comm. ACM 54, 11 (Nov. 2011), p 92.

Links: Abstract, Acrobat, Web page, Word.

Email: blampson@microsoft.com. This paper is at http://www.research.microsoft.com.

 

Abstract:

This short note gives my perspective on Nikolai Zeldovich’s paper about HiStar, a practical system that implements strict information flow control and can also run a large part of Linux.