A hardware architecture for implementing protection rings
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
Principles of Systems Programming
Principles of Systems Programming
Timesharing system design concepts (McGraw-Hill computer science series)
Timesharing system design concepts (McGraw-Hill computer science series)
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
On The Advantages of Tagged Architecture
IEEE Transactions on Computers
Penetrating an operating system: a study of VM/370 integrity
IBM Systems Journal
Operating system integrity in OS/VS2
IBM Systems Journal
Architectural approaches to secure databases
ACM SIGSMALL Newsletter
Patterns for the secure and reliable execution of processes
Proceedings of the 15th Conference on Pattern Languages of Programs
Hi-index | 14.99 |
A set of architectural extensions to a machine of the type of IBM System/370 is proposed. The proposal involves hardware/software interaction to constrain the execution-time behavior of application and higher authority programs. The extensions consist of new states of privilege, enforcement of disciplined transition between states, hardware distinction of information types, and a mechanism to control data transfers between main and external storage. Application of the extensions to a shared database system, where users interact through a high-level language, shows that protection of the operating system and the database can be enhanced significantly with respect to errors or deliberate attacks from users