Controlled information sharing in a computer utility
Controlled information sharing in a computer utility
Program and Addressing Structure in a Time-Sharing Environment
Journal of the ACM (JACM)
The structure of the “THE”-multiprogramming system
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
The HITAC5020 time sharing system
ACM '69 Proceedings of the 1969 24th national conference
SOSP '69 Proceedings of the second symposium on Operating systems principles
A Binary Single-Key-Lock System for Access Control
IEEE Transactions on Computers
Communications of the ACM
Extensible security architectures for Java
Proceedings of the sixteenth ACM symposium on Operating systems principles
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
A lattice model of secure information flow
Communications of the ACM
Reflections on an operating system design
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
A note on the confinement problem
Communications of the ACM
VLDB '91 Proceedings of the 17th International Conference on Very Large Data Bases
A proposal for certain process management and intercommunication primitives
ACM SIGOPS Operating Systems Review
HLL architectures: Pitfalls and predilections
ISCA '82 Proceedings of the 9th annual symposium on Computer Architecture
An architecture with comprehensive facilities of inter-process synchronization and communication
ISCA '80 Proceedings of the 7th annual symposium on Computer Architecture
Architecture of virtual machines
Proceedings of the workshop on virtual computer systems
Engineering a security kernel for Multics
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Dynamic linking and environment initialization in a multi-domain process.
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The PDP-11 virtual machine architecture: A case study
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
In support of domain structure for operating systems
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
An optimizing compiler for lexically scoped LISP
SIGPLAN '82 Proceedings of the 1982 SIGPLAN symposium on Compiler construction
A simulation method for multi-level data security analysis
ANSS '76 Proceedings of the 4th symposium on Simulation of computer systems
An experimental implementation of the kernel/domain architecture
SOSP '73 Proceedings of the fourth ACM symposium on Operating system principles
Towards the formal description of operating systems
Proceeding of ACM SIGPLAN - SIGOPS interface meeting on Programming languages - operating systems
Partitions and principles for secure operating systems
ACM '75 Proceedings of the 1975 annual conference
A method for implementing paged, segmented virtual memories on microprogrammable computers
ACM SIGOPS Operating Systems Review
A technique for passing reference parameters in an information-hiding architecture
ACM SIGARCH Computer Architecture News
A software flaw taxonomy: aiming tools at security
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Managing user relationships in hierarchies for information system security
Decision Support Systems
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Propositional Logic Constraint Patterns and Their Use in UML-Based Conceptual Modeling and Analysis
IEEE Transactions on Knowledge and Data Engineering
Architectural Support for System Protection and Database Security
IEEE Transactions on Computers
A Computer Architecture for Level Structured Systems
IEEE Transactions on Computers
Analysis of three multilevel security architectures
Proceedings of the 2007 ACM workshop on Computer security architecture
A rider to "A Question of Semantics"
ACM SIGARCH Computer Architecture News
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Operating systems principles and undergraduate computer science curricula
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Hardware/software trade-offs: reasons and directions
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
Architecture of virtual machines
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
On The Advantages of Tagged Architecture
IEEE Transactions on Computers
MYSEA: the monterey security architecture
Proceedings of the 2009 ACM workshop on Scalable trusted computing
Virtual control storage: security measures in VM/370
IBM Systems Journal
Hardware enforcement of application security policies using tagged memory
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
SCUTA: a server-side access control system for web applications
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Configurable fine-grain protection for multicore processor virtualization
Proceedings of the 39th Annual International Symposium on Computer Architecture
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 48.31 |
Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation. This paper describes hardware processor mechanisms for implementing these rings of protection. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to the supervisor. Automatic hardware validation of references across ring boundaries is also performed. Thus, a call by a user procedure to a protected subsystem (including the the supervisor) is identical to a call to a companion user procedure. The mechanisms of passing and referencing arguments are the same in both cases as well.