A hardware architecture for implementing protection rings

@article{Schroeder1972AHA,
  title={A hardware architecture for implementing protection rings},
  author={M. Schroeder and J. H. Saltzer},
  journal={Commun. ACM},
  year={1972},
  volume={15},
  pages={157-170}
}
  • M. Schroeder, J. H. Saltzer
  • Published 1972
  • Computer Science
  • Commun. ACM
  • Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation. This paper describes hardware processor mechanisms for implementing these rings of protection. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to the supervisor. Automatic hardware… CONTINUE READING
    183 Citations

    Topics from this paper.

    On The Advantages of Tagged Architecture
    • E. Feustel
    • Computer Science
    • IEEE Transactions on Computers
    • 1973
    • 139
    The Structure of a Security Kernel for the Z8000 Multiprocessor
    • 3
    Modern central processor architecture
    • 5
    Reflections on an operating system design
    • 115
    • PDF
    Protection: principles and practice
    • 462
    • PDF
    Hardware support for memory protection in sensor nodes
    • L. Lopriore
    • Computer Science
    • Microprocess. Microsystems
    • 2014
    • 3
    • PDF

    References

    SHOWING 1-2 OF 2 REFERENCES
    Model ~ processor Reference Manual, Cambridge Information Systems Laboratory
    • Honeywell Information Systems Inc., Apri 1
    • 1971
    Thestructureof the “THE’- multiprogramming system.Comm.ACM11
    • 1968