Fact-checked by Grok 2 weeks ago

Multics

Multics (Multiplexed Information and Computing Service) was a pioneering mainframe operating system initiated in as a collaborative research project between MIT's Project MAC, Bell Telephone Laboratories, and , aimed at creating a comprehensive, general-purpose utility to serve multiple users reliably and scalably. The development of Multics began in the early 1960s, building on the (CTSS) demonstrated at in 1961, with the goal of evolving it into a more ambitious system for widespread, interactive computing. The project selected the GE-645 computer in 1964, which featured innovations like ring-based access controls for security, and the first operational Multics system booted in 1967, though full service at commenced in 1969. By the , Multics supported over 1,000 users at for research, education, and administrative tasks, while General Electric's computer division was acquired by in 1970, leading to commercial deployments in government, industry, and education. Key architectural features of Multics included a system using hierarchical segmentation combined with paging—allowing programs to address up to 2^18 segments of up to 2^18 36-bit words each—and a unified that treated files, devices, and directories uniformly with built-in privacy controls and automatic backups. The system emphasized from the outset, incorporating a mechanism to enforce access controls and achieving a security rating from the U.S. Department of Defense in 1985, which highlighted its advanced subversion-resistant design. Written primarily in for portability, Multics provided an elegant, consistent programming environment that supported remote access and for efficient resource sharing. Multics exerted profound influence on subsequent operating systems, particularly Unix, which emerged at after their withdrawal from the project in 1969 due to delays and costs, adapting simplified concepts like hierarchical file systems and from Multics. Commercial support continued under until its cancellation in 1985, but installations persisted, with the final site at the Canadian Department of National Defence in shutting down on October 30, 2000. Today, Multics is preserved openly at , enabling and study of its innovations in , modularity, and multi-user computing.

Development History

Origins and Collaborators

The Multics project originated in 1964 at MIT's Project MAC, where planning began for a next-generation operating system to advance beyond the limitations of the (CTSS), which had demonstrated basic multi-user access but struggled with scalability and reliability. Motivated by the vision of a "computer utility" capable of serving a broad community, the initiative sought to create a dependable system for interactive that could support resource sharing among multiple users while maintaining individual privacy and efficiency. This effort was spurred by funding through Project MAC, which provided an initial annual budget of approximately $3-4 million to foster innovative involving and . Key collaborators included MIT's Project MAC, led by Professor , who oversaw the software design and coordination; Bell Telephone Laboratories, contributing expertise in with notable involvement from and ; and Company's Large Computer Products Division, which supplied the modified GE-645 hardware platform tailored for the project's needs. These partners brought complementary strengths: MIT's academic focus on concepts, Bell Labs' practical telecommunications experience, and GE's engineering capabilities in mainframe development. The specific goals of Multics emphasized supporting a few hundred simultaneous users through advanced , enabling each to interact as if they had sole access to the machine while ensuring secure, controlled sharing of files and resources via hardware-enforced protections. This ambitious scale aimed to transform computing from to a utility-like service, accommodating diverse applications from research to routine data processing without compromising system integrity or user isolation.

Key Milestones and Timeline

The Multics project emerged from a 1964 collaboration among MIT's Project MAC, Bell Telephone Laboratories, and to develop an advanced operating system. Development intensified in , with the delivery of a GE-635 computer to in August for use as a simulator during ; this enabled initial efforts, including the creation of basic system components tested on the simulator. By late , project leaders presented Multics concepts at the Fall Joint Computer Conference, outlining its ambitious goals for resource sharing and . In January 1967, the first GE-645 mainframe hardware arrived at and , marking the start of hardware-software ; early milestones included the "Phase .5" achievement of a functional with paging and segmentation, followed by December's " One" for bootloading and single-process execution, with demonstrations of these capabilities to stakeholders. The following year saw further progress, including the March "A3" milestone for and the October "Demonstrable Initial Multics" supporting eight simultaneous users. Multics became operational for public use at in 1969, initially supporting a limited number of users through services; however, withdrew from the project in April 1969, citing escalating development costs and delays. In 1970, General Electric's computer division was acquired by , leading to a migration of Multics to Honeywell hardware such as the Series 60/40 and later the 6180 ; this facilitated broader installations, including the U.S. Air Force's Air Development Center (RADC) site going operational in August 1970. Throughout the 1970s, Multics expanded to additional sites, including the U.S. Data Services (AFDSC) in 1973, various universities, and government facilities; a key event was the 1973-1974 security evaluation conducted by the and to assess Multics for handling multilevel classified (Secret and ) at AFDSC, which identified vulnerabilities in protection mechanisms but affirmed its potential with modifications. officially announced Multics as a commercial product alongside the 6180 in , boosting adoption. By the 1980s, Multics reached its peak with approximately 64 installations worldwide, including ongoing U.S. Air Force sites, the Canadian Department of National Defence (starting 1982), and universities such as the ; however, canceled further development in July 1985 amid declining demand, though the system earned a security rating from the U.S. Department of Defense in August 1985 based on enhanced protections. The original installation shut down in January 1988, with many sites following suit by the early 1990s, though emulations of Multics on modern hardware have sustained its study and limited use into the .

Decline and Current Status

The decline of Multics as a commercial operating system was influenced by several key factors, including its high development and operational costs, which made it less competitive against emerging alternatives. The system's tight integration with specialized hardware, following General Electric's sale of its computer division to in 1970, limited portability and increased dependency on a single vendor. Additionally, the withdrawal of from the project in 1969, due to prolonged delays and escalating expenses, deprived Multics of significant expertise and resources, accelerating its challenges. Competition from more affordable and flexible systems like Unix, which ran on cheaper minicomputers and emphasized simplicity, further eroded Multics' market position. Honeywell discontinued Multics development in 1985, marking the end of active production support, though existing installations continued operating. Over its lifetime, Multics was deployed at approximately 80 sites worldwide, primarily in , , and academic environments. The MIT installation shut down in January 1988, and the final remaining system at the Canadian Department of National Defence in , was decommissioned on October 30, 2000. As of 2025, Multics sees no commercial deployments but persists through open-source emulations that allow hobbyists to run the system on modern hardware. The DPS8M simulator, an open-source for the DPS 8/M architecture, enables Multics execution on platforms like Windows, macOS, and , with recent updates including Multics Release 12.8 for improved . Contributions from Multics historians like Paul Green have supported preservation efforts, including program collections and documentation that aid emulation. An active community of enthusiasts maintains these resources via sites like multicians.org, fostering ongoing interest in Multics' design principles. Its legacy is preserved in institutional archives, such as those at , where hardware artifacts and documentation are held for historical study. Preservation advanced significantly with the release of Multics source code in 2007 by Bull HN Information Systems Inc. to , making the final commercial release (MR12.5 from 1992) available as under an open license. This donation, coordinated through efforts like the Multics History Project, has enabled modern analysis, bug fixes, and emulator enhancements without proprietary restrictions.

Architectural Innovations

Core Design Principles

Multics was designed as a pioneering operating system, building upon the foundational concepts of the (CTSS) developed at to enable efficient multi-user access to computing resources. Its core principles emphasized , controlled , and , aiming to create a reliable, continuously that could support hundreds of simultaneous users without performance degradation. This vision positioned Multics as a prototype for a "computer utility," where computing power would be as accessible and dependable as public utilities like or . Central to Multics' architecture was its time-sharing model, which supported over 300 concurrent users through segmented virtual memory and dynamic relocation mechanisms. In this approach, the virtual address space of each process was divided into variable-sized segments, each with independent attributes for size, protection, and location, allowing direct hardware addressing of information without the need for data copying or manual buffering. Dynamic relocation was achieved via segment descriptor words (SDWs) in the hardware, which stored absolute core addresses and enabled segments to be loaded anywhere in physical memory on demand, facilitating efficient sharing and paging with a page size of 1,024 36-bit words on the Honeywell 645 processor. This design ensured low-latency access for multiple users, with controlled sharing enforced through per-segment access attributes checked by the hardware. The system's hierarchical structure further embodied its principles, utilizing a -based scheme with eight concentric s numbered 0 through 7 to delineate privilege levels from to . 0 served as the most protected space, housing critical supervisor functions, while outer s (up to 7 for typical es) operated with progressively restricted privileges, ensuring through separate address spaces managed by private descriptor segments per . This hierarchy, combined with for controlled transitions between s, promoted by allowing subsystems to be developed and executed independently while preventing unauthorized access, all verified on every memory reference. Multics embodied a vision through abstractions that treated shared resources as virtually infinite, particularly via a file-like representation for all persistent data in the form of segments accessible through a . This "" abstraction enabled seamless integration of storage as an boundless resource, where users could reference and manipulate data directly without concern for physical limitations, supported by demand paging and dynamic growth of segments. A key innovation in this model was absentee operation, allowing computations to execute independently of active user sessions; users could submit a command for queue-based processing, with the system handling initiation, suspension during overloads, and output delivery asynchronously, thus optimizing resource utilization across interactive and batch workloads.

Security and Protection Mechanisms

Multics pioneered advanced mechanisms in its environment, emphasizing hierarchical and discretionary access controls to safeguard resources among multiple users. These features were integral to its design, enabling secure sharing while mitigating risks of unauthorized access and . The system's relied on an 8-level hierarchy, numbered from 0 to 7, where 0 housed the most privileged code and outer , such as 4, contained typical user programs. transitions were strictly controlled through hardware-enforced and segment descriptor brackets, which validated calls between to prevent unauthorized elevation of privileges; for instance, a might allow execution from 5 into 0 only under specific conditions. This structure enforced isolation, ensuring that code in higher-numbered (less privileged) could access lower- resources only via defined entry points, reducing the compared to flat supervisor-user models. Access to files, known as segments, was managed through per-segment Access Control Lists (ACLs), which specified permissions for individual users, projects, or groups identified by principal IDs like "User.Project". Each ACL entry granted fine-grained rights, including read (r), write (w), and execute (e) for segments, or status (s), modify (m—including deletion), and append (a) for , allowing owners to tailor sharing precisely. Stored in the parent , these lists supported wildcard patterns for group access (e.g., "Jones.*") and hierarchical overrides, where directory modify rights could alter contained ACLs. User authentication occurred via password-based , requiring a ID and project identifier, with passwords stored in encrypted form using a one-way enciphering to verify entries without exposing . This method, implemented in 1971, provided basic protection against password disclosure, though it lacked modern salting techniques. Complementing this, Multics maintained audit trails for attempts, including failed logins, last times, and segment modifications, enabling early detection of potential intrusions through or procedural review of security-related events. The robustness of these mechanisms was affirmed in the 1973 Anderson Report, a U.S. study on technology, which praised Multics' descriptor-based architecture for efficient reference validation and its potential as a foundation for multilevel secure systems in military contexts, resistant to malicious unauthorized access.

File System and

The Multics file system employed a multi-level that integrated a of devices, including fast for rapid access, disks for bulk , and tapes for archival purposes, to provide what was effectively unlimited capacity. Files were conceptualized as unbounded of elements—such as words, characters, or bits—without predefined sizes, allowing them to grow dynamically as content was appended. This design enabled seamless migration of active files to faster levels and inactive ones to slower tiers, managed automatically by the system's storage management module to optimize performance and resource utilization. The directory structure in Multics formed a hierarchical tree, with directories serving as special files that contained entries for segments, subdirectories, or , accessible via path names like >user>project>file. Each segment and directory was protected by lists (ACLs), which specified permissions such as read (r), write (w), execute (x), or append (a) for individual users, groups, or the world, stored within the directory to enforce granular control. Symbolic provided shortcuts to files or directories elsewhere in the hierarchy, while was handled by appending numeric suffixes to filenames (e.g., report.1, report.2) to maintain multiple iterations without overwriting originals. Resource management in Multics relied on a segmented model, where was divided into segments of up to 256,000 36-bit words each, loaded on demand via paging mechanisms that fetched only referenced pages into core memory. Unused segments were subject to garbage collection processes that scanned for and reclaimed space from inactive or unreferenced , ensuring efficient allocation across the multi-level store. This approach supported dynamic sharing and relocation of segments without fixed boundaries, enhancing multiprogramming efficiency. The I/O model treated all input/output devices uniformly as files, represented as segments within the hierarchical structure, which allowed programs to access peripherals like terminals, printers, or disks through the same stream-oriented interfaces used for regular files. This device-independent simplified application development by enabling consistent read/write operations and chaining of data transformations across devices.

Software Features and Tools

Command Interface and Utilities

The Multics Command Language (MCL) served as an interactive for users to communicate with the operating system, enabling concise expression of commands through a structured syntax. Commands consisted of a name followed by arguments, separated by spaces and terminated by semicolons or newlines, allowing for chained execution within a single line. This language supported active functions enclosed in brackets, such as [date] to insert the current , which were evaluated and rescanned into the command stream for dynamic behavior. The , or command processor, interpreted these inputs, handling features like sets in parentheses for applying commands to multiple arguments and literal strings delimited by quotes. File utilities in Multics provided essential operations for managing segments and directories within the hierarchical file system. The print command (aliases: pr, dprint) displayed the contents of a file or queued it for output, as in print file_name to show the text of a segment. Navigation was handled by change_directory (aliases: cd, cwd), which set the current working directory, for example, cd >user_dir to switch to a user's home directory. Creation of new files or directories used create (aliases: cr), such as cr new_file to establish an empty segment. Deletion was performed with delete (alias: dl), like dl old_file to remove an entry. The copy command (aliases: cp, copy_seg) duplicated segments, e.g., copy source.epl target.epl. Directory listings were generated by listf (aliases: ls, list), which enumerated contents with options for details, as in listf >dir_path to view files in a specified directory. These utilities operated on pathnames supporting absolute and relative addressing, with pattern matching via star notation like *.* for all files. Session management commands facilitated user interaction and process control in Multics' multi-user environment. The login command (alias: l) initiated a process for a user, typically entered as login Person_id Project_id to authenticate and establish a session tied to a terminal. Conversely, logout terminated the session, releasing resources with options like -hold to preserve the process briefly, e.g., logout -brief for a summary before exit. Process interruption was achieved through stop_ variants, such as stop_run to discard the current run environment or halt ongoing operations. Real-time queries were supported by active functions like who, which listed currently logged-in users, invoked as [who] within commands to return a string of active sessions for integration into scripts or displays. These mechanisms ensured secure and efficient handling of concurrent user activities. Scripting in Multics relied on command files, stored as segments with a .ec extension (often referred to as .cmd in user contexts), which contained sequences of MCL commands for automation. Execution occurred via the exec_com command (alias: ec), such as exec_com script.ec to run a file's instructions sequentially, supporting parameter substitution with &1 for the first argument and control structures like &if for conditional logic. This allowed basic automation without the full depth of modern shell scripting, focusing on iterative and chained operations like applying print across multiple files in an iteration set: print (file1 file2).epl. Macros and absentee runs extended this capability, enabling reusable procedures for routine tasks.

Programming and Development Environments

Multics provided a rich set of programming languages and tools tailored for its segmented, multi-user environment, with serving as the primary implementation language due to its comprehensive support for system-level programming. The full compiler, developed concurrently with the operating system from 1965 onward, enabled the bulk of Multics to be written in , producing efficient directly compatible with the system's dynamic linking mechanisms. Other supported languages included for low-level utilities, for algorithmic tasks, and SNOBOL4 for pattern-matching and string processing applications. Additionally, assemblers such as ALM (Assembler Language for Multics) allowed direct hardware-level coding, facilitating custom extensions and performance optimizations. Editing tools in Multics emphasized programmability and integration with the system's hierarchical file structure. , a line-oriented text editor implemented in , offered basic editing capabilities with support for multiple buffers and executable command scripts, making it suitable for straightforward modification. For more advanced needs, a TECO-based editor served as a precursor to modern , providing macro-driven customization and real-time interaction; this evolved into Multics , which incorporated extensions for enhanced automation and directly within the editing session. Integrated debugging features, such as dynamic tracing and insertion tied to the runtime, allowed developers to inspect segmented code without recompilation. Build processes in Multics relied on a tool for linking object segments into executable forms, enabling modular without traditional static loaders; this dynamic approach supported on-demand resolution of inter-segment references during execution. was managed through file naming conventions within the , where developers appended unique identifiers (e.g., timestamps or sequence numbers) to segment names to track revisions, avoiding overwrites in shared directories. Scripting and exploratory programming were facilitated by interpreters, notably Multics Lisp (based on MACLISP), which provided an interactive environment for and could interface with routines for hybrid applications. This interpreter supported compilation to native code, enhancing performance for compute-intensive tasks while maintaining the system's multi-language .

Communication and Documentation Systems

Multics provided a suite of integrated tools for user communication and documentation, enabling collaborative interactions and efficient access to system information within its multi-user environment. These systems leveraged the operating system's and segment-based to facilitate real-time messaging and structured document handling, predating many modern equivalents. The subsystem in Multics was built on a RUNCOM-based framework, allowing scripted automation of message handling similar to early scripting. Users could send messages via the send_message command (or its synonym mail), which appended content to the recipient's mailbox segment, typically located at >udd>[Project](/page/Project)>[Person](/page/Person)>[Person](/page/Person).mbx, supporting both single-line inputs and multi-line entries terminated by a period. The read_mail command enabled users to retrieve and manage incoming mail, displaying summaries with sender, date, and time details, while offering options to list, delete, save, forward, or reply to messages. This system supported early forms of threaded discussions through tools like Pat Doherty's [continuum](/page/Continuum) (later renamed [forum](/page/Forum) in the 1970s), which organized conversations into hierarchical structures for ongoing group interactions. was also possible via send_message to active terminals, with the accept_messages command setting up event channels for real-time delivery. Documentation access relied on an interactive mechanism using segments—structured text files stored in directories like >doc>info—which functioned as an early hypertext-like system for navigating system knowledge. The help command allowed users to query topics or commands interactively, retrieving and displaying relevant segments paragraph by paragraph, with prompts for continuation (e.g., responding "yes" to proceed or "q" to quit). Enhancements like the list_help utility, introduced in 1975, added string-based searching across segments for more targeted retrieval. Complementing this, the browse command provided sequential or interactive viewing of text segments or files, enabling users to navigate contents line by line with filtering options, akin to paging through documents. For document processing, Multics featured the RUNOFF formatter, invoked via the runoff command, which transformed inputs into formatted output suitable for or storage as segments. This tool processed markup-like control lines (e.g., .fin for finishing input or .ind for indentation) to handle justification, margins, headers, and page breaks, bearing similarities to later systems like . It included capabilities for generating tables through structured formatting commands, supporting the creation of organized data presentations within documents. Additional facilities included the news command for disseminating system announcements, which displayed recent updates from info segments like system_changes.gi.info or message-of-the-day notices, with options to view full text. Remote access was supported via dial-up connections, using commands such as dial or connect to establish terminal sessions over telephone lines, requiring user attributes like "dialok" for security. These tools collectively emphasized Multics' focus on accessible, shared among users.

Legacy and Influence

Direct Impact on Unix

After Bell Labs withdrew from the Multics project in 1969 due to escalating costs and delays, and , who had contributed to Multics, began adapting its concepts to develop a simpler operating system on a minicomputer, leading to the creation of Unix. Unix directly borrowed Multics' , which organized files into directories with path names for easier navigation and management, replacing the PDP-7's initial flat structure. The process model in Unix, where creates a duplicating the parent and exec overlays a new program image, drew from Multics' multi-process handling and shell-based command execution, enabling efficient process creation and customization. Similarly, Unix for , introduced in 1972, were inspired by Multics' stream-splicing modules, allowing output from one command to serve as input to another without custom code. In adapting these elements, Unix deviated from Multics by simplifying security mechanisms; instead of Multics' multi-level ring protection and lists (ACLs), Unix used basic user ID () and group ID (GID) permissions with mode bits on files, prioritizing ease of on resource-constrained . This approach suited the smaller PDP-11 , focusing on a single-level without the segmented memory and granular protections of Multics. Early Unix versions from the 1970s, such as through V6, incorporated Multics-inspired utilities, including the line-oriented editor developed by in 1969, which simplified the features of Multics' editor while retaining its core text manipulation concepts.

Broader Influences on Operating Systems

Multics' security mechanisms, particularly its lists (ACLs) and protection rings, exerted a profound influence on subsequent secure operating system designs. The ACLs provided fine-grained, per-segment permissions that enforced ownership and access isolation, while the ring-based hierarchy—ranging from ring 0 for kernel operations to outer rings for user processes—enabled layered privilege separation to mitigate unauthorized escalations. These concepts directly informed the development of the Kernelized Secure Operating System (KSOS), which adopted Multics-inspired security kernels for in government applications. In modern systems, SELinux's (MAC) policies and type enforcement draw from Multics' emphasis on reference monitors and default-deny principles, adapting them for Linux's architecture to enhance kernel-level isolation. The innovations of Multics also shaped broader operating system paradigms, particularly in mainframe environments. As one of the first comprehensive systems, Multics enabled concurrent multi-user access with segmentation and paging, allowing efficient resource allocation across diverse workloads. This model influenced systems like the DEC operating system, which implemented similar multiprogramming and scheduling techniques for VAX hardware to support interactive computing in enterprise settings. Likewise, the TOPS-10 system for mainframes adopted Multics-derived primitives, including dynamic address translation and , to facilitate collaborative development environments. Multics' single-level store concept, which blurred distinctions between memory and persistent storage, prefigured the "" philosophy; this unified view resonated in , where resources like networks and devices are treated as file hierarchies, and in Linux's /proc filesystem, which exposes process and data as readable files for monitoring and control. Multics' design principles extended to other specialized projects, embedding its modularity and resource management in commercial and research systems. IBM's CP-67, a time-sharing extension for System/360 Model 67, mirrored Multics' segmented addressing and user isolation to compete in academic computing. In distributed systems, Multics' modular kernel and interprocess communication influenced microkernel architectures like Mach, where message-passing and virtual memory paging echoed Multics' segmented model for portability across multiprocessors. Academically, Multics remains a in secure operating system literature, with its designs extensively cited in foundational works. Jerry Saltzer's 1974 paper on Multics protection mechanisms outlined principles like complete and least , which have been referenced in hundreds of subsequent publications on and system integrity. Textbooks on operating systems, such as those covering bases, frequently invoke Multics as the exemplar for B2-level security evaluations under the TCSEC framework, underscoring its role in shaping methods for modern OS kernels.

Retrospective Evaluations

Multics is often praised for its pioneering approach to and reliability, features that were far ahead of contemporary systems in the and . The operating system incorporated mandatory access controls, hierarchical protection rings, and a design philosophy that emphasized secure information sharing among multiple users, which contributed to its achievement of a rating under the (TCSEC) in the 1980s. These mechanisms influenced subsequent secure computing standards, including the foundational ideas in the TCSEC "Orange Book," by demonstrating the feasibility of robust, verifiable in a multi-user environment. Additionally, Multics' use of high-level implementation and modular subsystems provided a reliable foundation that reduced common vulnerabilities like buffer overflows through language-level safeguards and hardware-enforced execute permissions. Despite these strengths, Multics faced significant criticisms for its complexity and performance implications, which hindered its commercial viability. The system's comprised approximately 250,000 by 1978, a substantial size for the era that reflected its ambitious integration of innovations like segmentation and multiple protection rings, but this led to maintenance challenges and portability issues. The eight-ring protection model, while innovative for fine-grained , introduced performance overhead in early implementations due to software-handled cross-ring transitions, although later designs mitigated some of this through automated validation. This overhead, combined with the system's reliance on , contributed to higher costs and slower adoption compared to simpler alternatives. Key lessons from Multics underscore the need to balance architectural ambition with practicality in operating system design. Its complexity contrasted sharply with Unix, which succeeded by adopting a simpler two-mode (/) protection scheme while retaining essential Multics concepts like hierarchical file systems and , illustrating that and encapsulation can achieve without excessive rings or segmentation. Multics highlighted the importance of small, isolated subsystems with well-defined interfaces, a that has informed modern OS evolution toward verifiable kernels and microkernels. In 2020s analyses, Multics is retrospectively viewed as remarkably prescient, with its and segmented addressing serving as precursors to contemporary techniques in cloud environments, though its monolithic complexity raises critiques regarding scalability for distributed, resource-constrained systems like those in modern hyperscale data centers. Ongoing efforts, such as open-source simulators, continue to reveal how Multics' secure, multi-user model anticipates current needs in shared computing infrastructures.

References

  1. [1]
    History - Multics
    Jul 31, 2025 · Multics (Multiplexed Information and Computing Service) is a mainframe time-sharing operating system begun in 1965 and used until 2000.Summary of Multics · Inception · Beginnings · Use at MIT
  2. [2]
    [PDF] INTRODUCTION AND OVERVIEW OF THE MULTICS SYSTEM
    Multics is a comprehensive, general-purpose programming system designed to meet the needs of a large computer utility, with a virtual memory system and ...
  3. [3]
    Multics
    Multics was a mainframe time-sharing operating system begun in 1965 and used until 2000. It was a major influence on subsequent computer operating systems.
  4. [4]
    [PDF] Thirty Years Later: Lessons from the Multics Security Evaluation
    Multics' evaluation showed subversion of protection mechanisms, the need for a verifiable security kernel, and that today's systems lack many of its security ...
  5. [5]
    Multics - MIT
    Overview. Multics (Multiplexed Information and Computing Service) was a mainframe timesharing operating system that began at MIT as a research project in 1965.
  6. [6]
    [PDF] multics: the first seven years - MIT
    Jan 17, 1972 · In 1964 planning began on the development of a prototype of a computer utility. The aspirations for this system, named Multics {for Multiplexed.
  7. [7]
    Project MAC - Multics
    Aug 14, 2014 · This article describes MIT's Project MAC, the organization that led the initial creation of Multics.Missing: inception | Show results with:inception
  8. [8]
    Evolution of the Unix Time-sharing System - Nokia
    From the point of view of the group that was to be most involved in the beginnings of Unix (K. Thompson, Ritchie, M. D. McIlroy, J. F. Ossanna), the decline and ...
  9. [9]
    Introduction and Overview of the Multics System
    Thus, the original goal was to time-share computers to allow simultaneous access by several persons while giving to each of them the illusion of having the ...
  10. [10]
    Multics Dates
    ### Multics Chronological Timeline (1964–1990)
  11. [11]
    [PDF] AD/A-001 120 MULTICS SECURITY EVALUATION - DTIC
    system in the Air Force Data Services Center (AFDSC) is presented. An overview is provided of the present implementation of the Multics Security controls.
  12. [12]
    Multics Site Timeline
    ### Summary of Multics Installations (1970s-1980s)
  13. [13]
    B2 Security Evaluation - Multics
    This article describes the Multics security evaluation that led to the B2 rating in the mid 1980s, starting with the needs and context.
  14. [14]
    History of Unix, BSD, GNU, and Linux - CrystalLabs
    Oct 4, 2025 · Bell withdrew from the project after 5 years, in 1969, as it became clear that Multics would not be a practical system in the short term.
  15. [15]
    Unix at 50: How the OS that powered smartphones started from failure
    Aug 29, 2019 · ... Bell Labs used to develop Multics cost almost as much as a Boeing 737. Thus, there was widespread interest in time sharing, which allowed ...Missing: commercial competition withdrawal
  16. [16]
    Multics - Computer History Wiki
    Dec 15, 2024 · Multics was intended as an information utility; ie a service to which those who wanted information processing would connect, much as people connect to the ...Missing: demos | Show results with:demos
  17. [17]
    October 30: Last Multics System Shut Down | This Day in History
    Oct 30, 2000 · october 30, 2000 Last Multics System Shut Down. Today the last remaining Multics installation is shut down at the Canadian Department of ...
  18. [18]
    News - Multics
    You can download an open source DPS8M simulator for Multics hardware and install it on a Windows, Macintosh, or Linux machine, and run your own copy of Multics ...Missing: PDP- x86
  19. [19]
    DPS8M Performance | DPS8M Blog - DPS8M Simulator
    Jun 2, 2025 · This post aims to show how the performance of systems implementing the 600/6000-series mainframe architecture evolved across hardware generations.
  20. [20]
    Paul Green Multics Collection
    Jun 6, 2011 · The Paul Green Multics Collection contains papers written by Paul Green, and programs written by Paul and several other Multicians.Missing: emulation 2025 DPS8M<|separator|>
  21. [21]
    Open-source history: See Multics source code - CNET
    Nov 14, 2007 · Honeywell took over GE's computer business, and Honeywell became Bull, which donated the source code at the site, MIT said. News of the ...Missing: 2006 | Show results with:2006
  22. [22]
    [PDF] Compatible Time-Sharing System (1961-1973) Fiftieth Anniversary ...
    Jun 1, 2011 · Because Bell Laboratories people were collaborators in the Multics effort before they left the project and created Unix instead, some of the ...
  23. [23]
    The Multics Virtual Memory: Concepts and Design
    Through the use of segmentation, however, Multics provides direct hardware addressing by user and system programs of all information, independent of its ...
  24. [24]
    The Multics virtual memory: concepts and design
    Here, the design and implementation considerations of segmentation and sharing in Multics are first discussed under the assumption that all information resides ...
  25. [25]
    [PDF] Protection and the control of information sharing in multics
    The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help provide insight into the ...
  26. [26]
    Protection and the control of information sharing in multics
    The design of mechanisms to control the sharing of information in the Multics system is described. Five design principles help provide insight into the ...
  27. [27]
    [PDF] MULTICS SYSTEM-PROGRAMMERS' MANUAL Identific2tion ...
    modes1 namely intergctive or absentee. An interactive computation (IC) is controlled by a user who enters commands at a remote terminal 1 receives responses.
  28. [28]
    Multics Virtual Memory - Tutorial and Reflections
    Understanding the Multics virtual memory is key to understanding many Multics mechanisms. Storage allocation, addressing, protection, file I/O, dynamic linking, ...
  29. [29]
    Multics Data Security
    The storage system maintains a hierarchy of segments and directories, which resembles an inverted tree branching out from a single root directory. Each segment ...
  30. [30]
    [PDF] Multics Data Security
    Hierarchical Storage System Structure. Each segment in the storage system has a ... The Ring Structure. The ring structure is used to set up protected user.
  31. [31]
    [PDF] Multics Security Evaluation: Vulnerability Analysis*
    AFDSC must provide responsive interactive time-shared computer services to users within the Pentagon at all classification levels from unclassified to top ...
  32. [32]
    The Multics encipher_Algorithm: Cryptologia - Taylor & Francis Online
    Oct 5, 2007 · This article describes the history and details of the Multics encipher_algorithm and how it was used for Key Generation, File Encryption, and ...
  33. [33]
    Multics MTB-679
    This MTB specifies what events in Multics are "security-related," what criteria will be used to tell if one is "interesting," and what mechanisms will be used ...Missing: intrusion | Show results with:intrusion
  34. [34]
    [PDF] Computer Security Technology Planning Study (Volume I)
    Oct 8, 1998 · This report presents a research and devel opment plan to guide the work leading to the achievement of secure multilevel computer systems for the ...Missing: 1973 | Show results with:1973
  35. [35]
    A General-Purpose File System For Secondary Storage - Multics
    Multilevel Storage Management Module. The multilevel storage management module operates as an independent process within the Multics system. This module ...
  36. [36]
    [PDF] Multilevel Storage Management - People | MIT CSAIL
    Multilevel Storage Management (BH.4) determines where in secondary stor- age a file in the Multics file hierarchy shall reside. The primary goal.
  37. [37]
    [PDF] Protection and the Control of Information Sharing in Multics
    The method used in Multics is to permit any user to construct a protected subsystem, which is a collection of programs and data with the property that the data ...
  38. [38]
    [PDF] The Multics Virtual Memory: Concepts and Design - Ed Thelen
    Oct 1, 2007 · • Demand paging – load into memory only the parts of a segment ... • On Multics, paging is done on a per-segment basis. • Modern OSs do ...
  39. [39]
    The Multics Input/Output System
    An I/O system has been implemented in the Multics system that facilitates dynamic switching of I/O devices.
  40. [40]
    Multics Glossary - MIT
    On Multics, instead of opening files, a user initiates segments, and all the ... I/O of hardware devices directly to and from his or her segments. IOI ...
  41. [41]
    [PDF] Multics Command Language - BX.1.00
    The Multics Command Language provides the user with a concise means of expressing his wishes to the Multics system. The language and implementation are based on.Missing: MCL | Show results with:MCL
  42. [42]
    [PDF] Multics - Bitsavers.org
    The Multics Commands and Active Functions manual is organized into four sections. Section 1 contains a basic introduction to manual use and term definition.Missing: MCL | Show results with:MCL
  43. [43]
    Execution Environment - Multics
    Feb 10, 2025 · This article describes the execution environment for Multics user programs in detail. Most of Multics is programmed in PL/I, and the Multics environment is ...
  44. [44]
    Multics MTB-734
    These features are: - The addition of a subroutine interface to ALM that will allow language translators to invoke the assembler directly. - The ability to ...<|control11|><|separator|>
  45. [45]
    Multics Emacs History/Design/Implementation
    Apr 8, 1996 · Classic paper describing thie history and design of Multics Emacs.Missing: vision | Show results with:vision
  46. [46]
    Multics MACLISP Compiler
    It interprets Multics control arguments, and remains in control, and executes (quit) out of lisp at the end of compilation. The function cf (in lcp_semant_) is ...
  47. [47]
    The History of Electronic Mail - Multics
    This military messaging system was begun in 1962 (Philco-Ford was the contractor) and deployed starting in 1966. Its messages were something like electronic ...Missing: inception | Show results with:inception
  48. [48]
    The Help Command - Multics
    Nov 29, 2021 · There was an internal document, Multics Standards SDN, AN82, which provided guidance on naming conventions and consistent behavior. I ...
  49. [49]
    50 years of Unix | Nokia.com
    The Multics project was high on ambition but fraught with problems, leading AT&T to withdraw from the effort. That left Thompson, Ritchie and several other Bell ...
  50. [50]
    The UNIX time-sharing system | Communications of the ACM
    The UNIX time-sharing system. Authors: Dennis M. Ritchie. Dennis M. Ritchie. Bell Lab, Murray Hill, NJ. View Profile. , Ken Thompson ... The Multics input-output ...Missing: influence | Show results with:influence
  51. [51]
    An incomplete history of the QED Text Editor - Nokia
    The "standard Unix editor" ed was first written by Ken Thompson for the PDP-7. It kept the basic text-line orientation, but radically simplified the regular ...Missing: influence | Show results with:influence
  52. [52]
    [PDF] The Legacy of Multics and Secure Operating Systems Today
    This paper aims to look at modern “reasonably secure” operating systems in light of the legacy of Multics and the research along the way. Multics was unique in ...Missing: beyond Perseus
  53. [53]
    Towards multilaterally secure computing platforms—with open ...
    ... (PERSEUS), and hardware functionalities offered by the Trusted Computing technology. ... Multics (Organick, 1972). However, their existence remained largely ...
  54. [54]
    Multics Features
    ### Summary of Multics Features on OS Design, Time-Sharing, and File Systems
  55. [55]
    Protection and control of information sharing in multics
    This paper describes the design of mechanisms to control sharing of information in the Multics system. Seven design principles help provide insight into the ...Missing: textbooks | Show results with:textbooks
  56. [56]
    Myths about Multics
    Jul 31, 2025 · This came in late 1967, years before Unix was started; Ken Thompson and Dennis Ritchie were part of the BTL team working on Multics then, using ...Missing: inception | Show results with:inception
  57. [57]
    [PDF] A Hardware Architecture for Implementing Protection Rings
    The paper describes a set of processor access control mechanisms that were devised as part of the second iteration of the hardware base for the Multics system.
  58. [58]
    [PDF] extracting the lessons of Multics | USENIX
    The mouse would come shortly as Engelbart gained experi- ence with Augment and, later, NLS (early hypertext systems). In the middle of this, a bunch of technolo ...
  59. [59]
    Multics
    ### Summary of Retrospective Evaluations and Modern Views on Multics Strengths, Weaknesses, Lessons