Publications, Presentations, Protocols, and Patents


Publications


Jump to:

Presentations

    Device Drivers

  • Software Support for Improved Driver Reliability talk at UMass, UT-Austin, 2009-2010. (pdf)
  • Decaf: Moving Device Drivers to a Modern Language talk at USENIX, June 2009. (pdf)
  • The Design and Implementation of Microdrivers talk at ASPLOS, March 2008. (pdf)
  • Improving the Reliabibility of Commodity Operating Systems talk given at UIUC ACM Reflections/Projections Conference, October 2006. (pdf)
  • Improving the Reliabibility of Commodity Operating Systems job talk given at various places in 2005 (pdf)
  • Recovery Device Drivers talk at OSDI 2004, December 2004. (pdf)
  • Recovering Device Drivers, or Cleaning Up Nooks talk in UW class CSE551: Graduate Operating Systems (pdf)
  • Shadow Drivers: Transparent Recovery for Kernel Extensions poster at UW industrial Affiliates, February 2004 (pdf)
  • Improving the Reliability of Commodity Operating Systems talk at SOSP 2003, October 2003 (pdf)
  • Nooks poster at UW industrial Affiliates, February 2003 (pdf)
  • Nooks: an architecture for reliable device drivers talk at ACM SIGOPS worksop, September 2002(ppt)
  • Nooks: an architecture for reliable device drivers talk at UW Networking and Systems Retreat, June 2002 (ppt)
  • Transactional Memory

  • Transactional Memory for Existing Programs talk at TMW 1, 2010. (pdf)
  • OS Support for Virtualizing Transactional Memory talk at TRANSACT 2008. (pdf)

Internet Requests for Comment


Internet Drafts

  • "The Windows 2000 RC4-HMAC Kerberos encryption type", John Brezak, Michael Swift, 11/15/2000.
  • "Lightweight Kerberos Mechanism", J Trostle, Michael Swift, 11/22/2000 (expired).
  • "Kerberos Set/Change Password: Version 2", Michael Swift, Jonathan Trostle, John Brezak, Bill Gossman 4/2000. (expired)
  • "Extending the GSS Kerberos Mechanism for Initial Kerberos Authentication (IAKERB)", Michael Swift, Jonathan Trostle, Bernard Aboba and Glen Zorn, 7/2001 (expired).
  • "User to User Kerberos Authentication using GSS-API",  Michael Swift 10/1999 (expired).
  • "Extensions to Kerberos V5 For Additional Initial Encryption", Jonathan Trostle and Michael M. Swift, 12/24/1999 (expired).
  • "Generating KDC referrals to locate Kerberos Realms", Michael Swift, J. Brezak, J. Trostle, K. Raeburn, 2/2001 (expired).

Patents:

  • US 2012/0204060 A1: "Providing restartable file systems within computing devices," by Michael M. Swift, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Swaminathan Sundararaman, Sriram Subramanian and Abhishek Rajimwale. Pending.
  • US08239633: "Non-broadcast signature-based transactional memory", by David A. Wood Mark D. Hill, Michael M. Swift, Michael R. Marty, Luke Yen Kevin E. Moore, Jayaram Bobba, Haris Volos, issued August 2012.
  • US07673174: "Recovering Device Drivers", by M. Swift, B. Bershad, H. Levy, issued March 2010
  • US07113994: “System and method of proxy authentication in a secured network,” by M. Swift, N. Amit, R. Ward, issued September 2006.
  • US6625603: “Object-type specific access control,” by P. Garg, M. Swift, C. Van Dyke, R. Ward, and P. Brundrett, issued September 2003.
  • US6505300: “Method and system for secure running of untrusted content,” by S. Chan, G.  Jensenworth, M. Goertzel, B. Shah, M. Swift, and R. Ward, issued January 2003.
  • US6427209: “System and method of user logon in combination with user authentication for network access,” by J. Brezak, R. Ward, M. Swift, P. Leach, issued July 2002.
  • US6412070: “Extensible security system and method for controlling access to objects in a computing environment,” by C. Van Dyke, P. Brundrett, M. Swift, P. Garg, and R. Ward, issued June 2002.
  • US6401211: “System and method of user logon in combination with user authentication for network access,” by J. Brezak, R. Ward, M. Swift, and P. Leach, issued June 2002.
  • US6377691: “Challenge-response authentication and key exchange for a connectionless security protocol,” by M. Swift and B. Shah, issued Apr. 2002.
  • US6308274: “Least privilege via restricted tokens,” by M. Swift, issued Oct. 2001.
  • US6289458: “Per-property access control mechanism,” by P. Garg, M. Swift, C. Van Dyke, R. Ward, and P. Brundrett, issued Sept. 2001.
  • US6279111: “Security model using restricted tokens,” by G. Jensenworth, P. Garg, M. Swift, M. Goertzel, and S. Chan, issued Aug. 2001.
  • US6189100: “Ensuring the integrity of remote boot client data,” by A. Barr, M. Swift, and C. Lenzmeier, issued Feb. 2001.
  • US5768519: “Method and apparatus for merging user accounts from a source security domain into a target security domain,” by M. Swift, C. Van Dyke, R. Reichel, P. Misra, M. Seaman, J. Kelly, issued June 1998.
  • US5761669: “Controlling access to objects on multiple operating systems,” by D. Montague, P. Misra, M. Swift, and R. Reichel, issued June 1998.
  • US5719941: “Method for changing passwords on a remote computer,” by M. Swift, C. Van Dyke, and P. Misra, issued Feb. 1998.
  • US5708812: “Method and apparatus for Migrating from a source domain network controller to a target domain network controller,” by C. Van Dyke, M. Swift, K. Logan, and P. Misra, issued Jan 1998.

Michael M. Swift

Michael M. Swift

Associate Professor
Computer Sciences Department
College of Letters and Sciences
University of Wisconsin, Madison


Contact Information

608-890-0131
swift at cs dot wisc dot edu

7369 Computer Sciences
Computer Sciences Department
University of Wisconsin-Madison
1210 West Dayton Street
Madison, WI 53706-1685 USA