MULTICS


Also found in: Encyclopedia, Wikipedia.
AcronymDefinition
MULTICSMultiplexed Information & Computing Service
References in periodicals archive ?
Dennis, "Virtual Memory, Processes, and Sharing in MULTICS," Communications of the ACM 11, no.
The Multics system internally encrypted its password list so that even if printed out the passwords were not intelligible.
The tiger team penetrated Multics and modified the manufacturer's master copy of the Multics operating system itself by installing a trap door: computer instructions to deliberately bypass the normal security checks and thus ensure penetration even after the initial flaw was fixed.
Nevertheless, I would like to give special mention to Marjorie Daggett and Bob Daley for their parts in the birth of CTSS and to Bob Fano and the late Ted Glaser for their critical contributions to the development of the Multics System.
So one of the tensions that went on for years was between the old batch-processing product line, and the new potential product, Multics, which was obviously a competitor.
Corbato for "his pioneering work in formulating the concepts and leading the development of CTSS and Multics, the earliest general-purpose large-scale time-sharing and resource-sharing computer systems.
Corbato is being honored for his pioneering work in formulating the concepts and leading the development of CTSS and Multics, the earliest general-purpose large-scale timesharing and resource-sharing computer systems.
With reference to Multics, which of the following statements is false?
Techniques for building operating systems such as UNIX, Multics, Mach, VMS, and MS-DOS.
As a graduate student and faculty member at MIT, Schroeder worked on protection and security in computer systems, and on the Multics project.
Multics uses a similar mechanism for authenticating jobs submitted from a card reader: The job goes into a holding directory and is not run until user logs on and says to run it.
Full browser ?