Cooperation of Mutually Suspicious Subsystems in a Computer Utility
dc.contributor.advisor | Saltzer, Jerome H. | en_US |
dc.contributor.author | Schroeder, Michael D. | en_US |
dc.date.accessioned | 2023-03-29T14:57:05Z | |
dc.date.available | 2023-03-29T14:57:05Z | |
dc.date.issued | 1972-09 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/149414 | |
dc.description.abstract | This thesis describes practical protection mechanisms that allow mutually suspicious subsystems to cooperate in a single computation and still be protected from one another. The mechanisms are based on the division of a computation into independent domains of access privilege, each of which may encapsulate a protected subsystem. The central component of the mechanisms is a hardware processor that automatically enforces the access constraints associated with a multidomain computation implemented as a single execution point in a segmented virtual memory. | en_US |
dc.relation.ispartofseries | MIT-LCS-TR-104 | |
dc.relation.ispartofseries | MAC-TR-104 | |
dc.title | Cooperation of Mutually Suspicious Subsystems in a Computer Utility | en_US |
dc.identifier.oclc | 03468214 |