Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/800050.801834acmconferencesArticle/Chapter ViewAbstractPublication PagesasplosConference Proceedingsconference-collections
Article
Free access

Hardware support for memory protection: Capability implementations

Published: 01 March 1982 Publication History
  • Get Citation Alerts
  • Abstract

    This paper is intended to stimulate discussion on the present state of hardware supported capability systems. Interest in such systems grew up in the mid-1960's and since that time information has been published on several different versions. In the opinion of some observers, the software complexity of these systems outweighs the advantage gained. The paper surveys the situation, and endeavors to set out the general features that a hardware supported capability system should possess. An attempt is made to identify the causes of the complexity and to make recommendations for removing them. The arguments for and against the tagging of capabilities are discussed and attention is drawn to a system of semi-tagging previously proposed by the author.

    References

    [1]
    D.M. England (1974) Capability concept mechanisms and structure in System 250. Protection in Operating Systems, IRIA, Rocquencourt, France, p 63.
    [2]
    A.J. Herbert (1979) A hardware supported protection architecture. Operating Systems, ed Lanciaux. North Holland, Amsterdam. Reprinted in Wilkes and Needham (1979).
    [3]
    IBM (1980) "IBM System/38 Technical Developments" 958060237
    [4]
    Intel Corporation (1981) "Introduction to the iAPX 432 Architecture." Manual 171821-001.
    [5]
    J.H. Morris (1973) Protection in programming languages. Communications of the A.C.M., vol. 16, p 15.
    [6]
    D.D. Redell (1974) "Naming and protection in extendable operating systems." Ph.D. thesis, University of California at Berkeley.
    [7]
    M.V. Wilkes (1968) "Time-sharing Computer Systems." 3rd edition, 1975. MacDonald and Jane, London; American Elsivier, New York.
    [8]
    M.V. Wilkes (1980) A new hardware capability architecture. Operating System Review, vol. 14 no. 2, p 17.
    [9]
    Wilkes and R.M. Needham (1979) "The Cambridge CAP Computer and its Operating System." North Holland, New York.
    [10]
    W.A. Wulf, R. Levin, and S.P. Harbison (1981) "Hydra/C.mmp. An Experimental Computer System. McGraw-Hill, New York.

    Cited By

    View all
    • (2016)IntroductionMemory Controllers for Mixed-Time-Criticality Systems10.1007/978-3-319-32094-6_1(1-16)Online publication date: 12-Apr-2016
    • (1992)Distribution + persistence = global virtual memory[1992] Proceedings of the Second International Workshop on Object Orientation in Operating Systems10.1109/IWOOOS.1992.252993(96-99)Online publication date: 1992
    • (1989)Run-time checking in Lisp by integrating memory addressing and range checkingACM SIGARCH Computer Architecture News10.1145/74926.7495817:3(290-297)Online publication date: 1-Apr-1989
    • Show More Cited By

    Index Terms

    1. Hardware support for memory protection: Capability implementations

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ASPLOS I: Proceedings of the first international symposium on Architectural support for programming languages and operating systems
        March 1982
        209 pages
        ISBN:0897910664
        DOI:10.1145/800050
        • cover image ACM SIGARCH Computer Architecture News
          ACM SIGARCH Computer Architecture News  Volume 10, Issue 2
          March 1982
          209 pages
          ISSN:0163-5964
          DOI:10.1145/964750
          Issue’s Table of Contents
        • cover image ACM SIGPLAN Notices
          ACM SIGPLAN Notices  Volume 17, Issue 4
          Proceedings of the 1982 symposium on Architectural support for programming languages and operating systems
          April 1982
          209 pages
          ISSN:0362-1340
          EISSN:1558-1160
          DOI:10.1145/960120
          Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 March 1982

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate 535 of 2,713 submissions, 20%

        Upcoming Conference

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)77
        • Downloads (Last 6 weeks)6
        Reflects downloads up to 10 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2016)IntroductionMemory Controllers for Mixed-Time-Criticality Systems10.1007/978-3-319-32094-6_1(1-16)Online publication date: 12-Apr-2016
        • (1992)Distribution + persistence = global virtual memory[1992] Proceedings of the Second International Workshop on Object Orientation in Operating Systems10.1109/IWOOOS.1992.252993(96-99)Online publication date: 1992
        • (1989)Run-time checking in Lisp by integrating memory addressing and range checkingACM SIGARCH Computer Architecture News10.1145/74926.7495817:3(290-297)Online publication date: 1-Apr-1989
        • (1989)Run-time checking in Lisp by integrating memory addressing and range checkingProceedings of the 16th annual international symposium on Computer architecture10.1145/74925.74958(290-297)Online publication date: 1-Apr-1989
        • (1989)Run-time Checking In Lisp By Integrating Memory Addressing And Range CheckingThe 16th Annual International Symposium on Computer Architecture10.1109/ISCA.1989.714564(290-297)Online publication date: 1989
        • (1988)Object-Oriented SystemsIEEE Expert: Intelligent Systems and Their Applications10.1109/64.218863:3(9-15)Online publication date: 1-Sep-1988
        • (1984)BibliographyCapability-Based Computer Systems10.1016/B978-0-932376-22-0.50016-8(207-218)Online publication date: 1984
        • (2006)Avoiding trickle‐down recompilation in the Mary2 implementationSoftware: Practice and Experience10.1002/spe.438014120614:12(1149-1157)Online publication date: 30-Oct-2006
        • (2019)Password-based protection of clustered segments in distributed memory systemsJournal of Parallel and Distributed Computing10.1016/j.jpdc.2018.01.003115:C(29-40)Online publication date: 4-Jan-2019
        • (2019)Access control lists in password capability environmentsComputers and Security10.1016/j.cose.2016.08.00562:C(317-327)Online publication date: 1-Jan-2019
        • Show More Cited By

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media