A hardware architecture for implementing protection rings
- 1 March 1972
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 15 (3), 157-170
- https://doi.org/10.1145/361268.361275
Abstract
Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation. This paper describes hardware processor mechanisms for implementing these rings of protection. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to the supervisor. Automatic hardware validation of references across ring boundaries is also performed. Thus, a call by a user procedure to a protected subsystem (including the the supervisor) is identical to a call to a companion user procedure. The mechanisms of passing and referencing arguments are the same in both cases as well.Keywords
This publication has 6 references indexed in Scilit:
- The HITAC5020 time sharing systemPublished by Association for Computing Machinery (ACM) ,1969
- The multics virtual memoryPublished by Association for Computing Machinery (ACM) ,1969
- The structure of the “THE”-multiprogramming systemCommunications of the ACM, 1968
- Protection in an information processing utilityCommunications of the ACM, 1968
- Programming semantics for multiprogrammed computationsCommunications of the ACM, 1966
- Program and Addressing Structure in a Time-Sharing EnvironmentJournal of the ACM, 1966