Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Hardware support for memory protection: Capability implementations

Published: 01 March 1982 Publication History

Abstract

This paper is intended to stimulate discussion on the present state of hardware supported capability systems. Interest in such systems grew up in the mid-1960's and since that time information has been published on several different versions. In the opinion of some observers, the software complexity of these systems outweighs the advantage gained. The paper surveys the situation, and endeavors to set out the general features that a hardware supported capability system should possess. An attempt is made to identify the causes of the complexity and to make recommendations for removing them. The arguments for and against the tagging of capabilities are discussed and attention is drawn to a system of semi-tagging previously proposed by the author.

References

[1]
D.M. England (1974) Capability concept mechanisms and structure in System 250. Protection in Operating Systems, IRIA, Rocquencourt, France, p 63.
[2]
A.J. Herbert (1979) A hardware supported protection architecture. Operating Systems, ed Lanciaux. North Holland, Amsterdam. Reprinted in Wilkes and Needham (1979).
[3]
IBM (1980) "IBM System/38 Technical Developments" 958060237
[4]
Intel Corporation (1981) "Introduction to the iAPX 432 Architecture." Manual 171821-001.
[5]
J.H. Morris (1973) Protection in programming languages. Communications of the A.C.M., vol. 16, p 15.
[6]
D.D. Redell (1974) "Naming and protection in extendable operating systems." Ph.D. thesis, University of California at Berkeley.
[7]
M.V. Wilkes (1968) "Time-sharing Computer Systems." 3rd edition, 1975. MacDonald and Jane, London; American Elsivier, New York.
[8]
M.V. Wilkes (1980) A new hardware capability architecture. Operating System Review, vol. 14 no. 2, p 17.
[9]
Wilkes and R.M. Needham (1979) "The Cambridge CAP Computer and its Operating System." North Holland, New York.
[10]
W.A. Wulf, R. Levin, and S.P. Harbison (1981) "Hydra/C.mmp. An Experimental Computer System. McGraw-Hill, New York.

Cited By

View all

Index Terms

  1. Hardware support for memory protection: Capability implementations

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM SIGARCH Computer Architecture News
      ACM SIGARCH Computer Architecture News  Volume 10, Issue 2
      March 1982
      209 pages
      ISSN:0163-5964
      DOI:10.1145/964750
      Issue’s Table of Contents
      • cover image ACM Conferences
        ASPLOS I: Proceedings of the first international symposium on Architectural support for programming languages and operating systems
        March 1982
        209 pages
        ISBN:0897910664
        DOI:10.1145/800050
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 March 1982
      Published in SIGARCH Volume 10, Issue 2

      Check for updates

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)102
      • Downloads (Last 6 weeks)27
      Reflects downloads up to 15 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)Password-based protection of clustered segments in distributed memory systemsJournal of Parallel and Distributed Computing10.1016/j.jpdc.2018.01.003115:C(29-40)Online publication date: 4-Jan-2019
      • (2019)Access control lists in password capability environmentsComputers and Security10.1016/j.cose.2016.08.00562:C(317-327)Online publication date: 1-Jan-2019
      • (2018)Memory protection in embedded systemsJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2016.01.00663:C(61-69)Online publication date: 29-Dec-2018
      • (2016)IntroductionMemory Controllers for Mixed-Time-Criticality Systems10.1007/978-3-319-32094-6_1(1-16)Online publication date: 12-Apr-2016
      • (1992)Distribution + persistence = global virtual memory[1992] Proceedings of the Second International Workshop on Object Orientation in Operating Systems10.1109/IWOOOS.1992.252993(96-99)Online publication date: 1992
      • (1989)Run-time checking in Lisp by integrating memory addressing and range checkingACM SIGARCH Computer Architecture News10.1145/74926.7495817:3(290-297)Online publication date: 1-Apr-1989
      • (1989)Run-time checking in Lisp by integrating memory addressing and range checkingProceedings of the 16th annual international symposium on Computer architecture10.1145/74925.74958(290-297)Online publication date: 1-Apr-1989
      • (1989)Run-time Checking In Lisp By Integrating Memory Addressing And Range CheckingThe 16th Annual International Symposium on Computer Architecture10.1109/ISCA.1989.714564(290-297)Online publication date: 1989
      • (1988)Object-Oriented SystemsIEEE Expert: Intelligent Systems and Their Applications10.1109/64.218863:3(9-15)Online publication date: 1-Sep-1988
      • (1984)BibliographyCapability-Based Computer Systems10.1016/B978-0-932376-22-0.50016-8(207-218)Online publication date: 1984
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media