Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Communications of the ACM
IBM System/38 support for capability-based addressing
ISCA '81 Proceedings of the 8th annual symposium on Computer Architecture
Protection domain extensions in Mungi
IWOOOS '96 Proceedings of the 5th International Workshop on Object Orientation in Operating Systems (IWOOOS '96)
Labels and event processes in the asbestos operating system
Proceedings of the twentieth ACM symposium on Operating systems principles
Linking programs in a single address space
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
Capability Based Tagged Architectures
IEEE Transactions on Computers
Labels and event processes in the Asbestos operating system
ACM Transactions on Computer Systems (TOCS)
Organizing and sharing distributed personal web-service data
Proceedings of the 17th international conference on World Wide Web
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Configurable fine-grain protection for multicore processor virtualization
Proceedings of the 39th Annual International Symposium on Computer Architecture
Hi-index | 0.00 |
The IBM System/38 machine architecture provides data security through addressability control and protection domains while minimizing overhead for this service. This paper describes the addressing mechanism, basic data organization and process structure of the System/38. These constructs are fundamental to the operation of the security mechanism. A description is given of security in the architecture and how it can be extended.