The implementation of abstract objects in a capability based addressing architecture
The Computer Journal
A programmer's view of the Intel 432 system
A programmer's view of the Intel 432 system
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
Abstract data types and the development of data structures
Communications of the ACM
Reflections on an operating system design
Communications of the ACM
Communications of the ACM
A technique for software module specification with examples
Communications of the ACM
On the criteria to be used in decomposing systems into modules
Communications of the ACM
POPL '73 Proceedings of the 1st annual ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Capability-Based Computer Systems
Capability-Based Computer Systems
Advances in Computer Architecture
Advances in Computer Architecture
Computer Programming and Architecture: The VAX-11
Computer Programming and Architecture: The VAX-11
Advanced Computer Design
A hardware mechanism for supporting range checks
ACM SIGARCH Computer Architecture News
IBM System/38 support for capability-based addressing
ISCA '81 Proceedings of the 8th annual symposium on Computer Architecture
Security and protection of data in the IBM System/38
ISCA '80 Proceedings of the 7th annual symposium on Computer Architecture
TASK forces: Distributed software for solving problems of substantial size
ICSE '79 Proceedings of the 4th international conference on Software engineering
Protection in the Hydra Operating System
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The Cambridge CAP computer and its protection system
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
The CAP project - an interim evaluation
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
StarOS, a multiprocessor operating system for the support of task forces
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
Variable-length capabilities as a solution to the small-object problem
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
iMAX: A multiprocessor operating system for an object-based computer
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
Capability architecture revisited
ACM SIGOPS Operating Systems Review
A hardware implementation of capability-based addressing
ACM SIGOPS Operating Systems Review
Why not innovations in computer architecture?
ACM SIGARCH Computer Architecture News
Hardware detection of undefined references
ACM SIGARCH Computer Architecture News
CLU REFERENCE MANUAL
Nesting in Ada programs is for the birds
SIGPLAN '80 Proceedings of the ACM-SIGPLAN symposium on Ada programming language
Report on the programming language Euclid
ACM SIGPLAN Notices
A new hardware capability architecture
ACM SIGOPS Operating Systems Review
SIMULA 67 common base language, (Norwegian Computing Center. Publication)
SIMULA 67 common base language, (Norwegian Computing Center. Publication)
Programming-in-the-Large Versus Programming-in-the-Small
IEEE Transactions on Software Engineering
Review and Revocation of Access Privileges Distributed Through Capabilities
IEEE Transactions on Software Engineering
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Software management of Cm*: a distributed multiprocessor
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
On The Advantages of Tagged Architecture
IEEE Transactions on Computers
Scheme for invalidating references to freed storage
IBM Journal of Research and Development
Specification techniques for data abstractions
IEEE Transactions on Software Engineering
Hi-index | 14.98 |
An architecture is presented which incorporates capability based addressing and memory tagging features. It defines three kinds of mechanisms for the implementation of object types, which correspond to as many different levels of abstraction. At the lower level, there are the machine types, the operations of which are implemented by machine instructions. At the upper level, there are user types, the operations of which are concretized by means of software routines. The intermediate level is that of predefined types; in this case, too, the operations are supported by software routines, but their efficiency of execution is much greater than is usually to be found in operations of user types. However, one drawback is that these routines should be proved to be correct, as they have a potential for corrupting the integrity of the whole protection system.