skip to main content
article
Free Access

Architectural support for system protection (Recent Results)

Published:17 January 1976Publication History
Skip Abstract Section

Abstract

A set of architectural extensions, involving hardware/software interaction, is proposed to constrain the execution-time behavior of application and higher authority programs, running in a CPU of the type of IBM System 370. The extensions consist of the addition of a new state to the previous supervisor and problem states enforcement of disciplined transition between states, hardware distinction of four data types, and a set of rules that enforce the structure of processes operating in this environment. Application of the extensions to a shared data base shows that the protection of the operating system under which it runs can be enhanced significantly, with respect to errors or attacks from the users of this data base.

Index Terms

  1. Architectural support for system protection (Recent Results)

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGARCH Computer Architecture News
        ACM SIGARCH Computer Architecture News  Volume 4, Issue 4
        January 1976
        210 pages
        ISSN:0163-5964
        DOI:10.1145/633617
        Issue’s Table of Contents

        Copyright © 1976 Authors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 January 1976

        Check for updates

        Qualifiers

        • article
      • Article Metrics

        • Downloads (Last 12 months)14
        • Downloads (Last 6 weeks)5

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader