Communications of the ACM
A model highlighting the security of operating systems
ACM '74 Proceedings of the 1974 annual conference - Volume 1
ACM SIGMIS Database
Sealing OS processes to improve dependability and safety
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Making information flow explicit in HiStar
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Multics: the first seven years
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
SIGFIDET '71 Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
Data privacy and integrity requirements for online data management systems
SIGFIDET '71 Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
Making information flow explicit in HiStar
Communications of the ACM
Operating systems principles and undergraduate computer science curricula
ACM SIGMIS Database
ACM SIGMIS Database
Hi-index | 0.03 |
This paper appears in the March, 1972, issue of the Communications of the ACM. Its abstract is reproduced below. Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to the supervisor. Automatic hardware validation of references across ring boundaries is also performed. Thus, a call by a user procedure to a protected subsystem (including the supervisor) is identical to a call to a companion user procedure. The mechanisms of passing and referencing arguments are the same in both cases as well.