A hardware architecture for implementing protection rings

@article{Schroeder1972AHA,
  title={A hardware architecture for implementing protection rings},
  author={M. Schroeder and J. H. Saltzer},
  journal={Commun. ACM},
  year={1972},
  volume={15},
  pages={157-170}
}
  • M. Schroeder, J. H. Saltzer
  • Published 1972
  • Computer Science
  • Commun. ACM
  • Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation. This paper describes hardware processor mechanisms for implementing these rings of protection. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to the supervisor. Automatic hardware… CONTINUE READING

    Topics from this paper.

    The protection of information in computer systems
    • 2,376
    • PDF
    Protection: principles and practice
    • 460
    • PDF
    On The Advantages of Tagged Architecture
    • 136
    Fault Tolerant Operating Systems
    • 210
    • PDF
    Reflections on an operating system design
    • 115
    • PDF
    When Virtual Is Better Than Real
    • 446

    References

    Publications referenced by this paper.
    SHOWING 1-2 OF 2 REFERENCES
    Model ~ processor Reference Manual, Cambridge Information Systems Laboratory
    • 1971
    Thestructureof the “THE’- multiprogramming system.Comm.ACM11
    • 1968