A Hardware Architecture for Implementing Protection Rings

@article{Schroeder1972AHA,
  title={A Hardware Architecture for Implementing Protection Rings},
  author={Michael D. Schroeder and Jerome H. Saltzer},
  journal={Commun. ACM},
  year={1972},
  volume={15},
  pages={157-170}
}
Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation. This paper describes hardware processor mechanisms for implementing these rings of protection. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to the supervisor. Automatic hardware… CONTINUE READING
Highly Cited
This paper has 189 citations. REVIEW CITATIONS

Citations

Publications citing this paper.

189 Citations

051015'71'87'04
Citations per Year
Semantic Scholar estimates that this publication has 189 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…