Show simple item record

dc.contributor.advisorSaltzer, Jerome H.en_US
dc.contributor.authorSchroeder, Michael D.en_US
dc.date.accessioned2023-03-29T14:57:05Z
dc.date.available2023-03-29T14:57:05Z
dc.date.issued1972-09
dc.identifier.urihttps://hdl.handle.net/1721.1/149414
dc.description.abstractThis thesis describes practical protection mechanisms that allow mutually suspicious subsystems to cooperate in a single computation and still be protected from one another. The mechanisms are based on the division of a computation into independent domains of access privilege, each of which may encapsulate a protected subsystem. The central component of the mechanisms is a hardware processor that automatically enforces the access constraints associated with a multidomain computation implemented as a single execution point in a segmented virtual memory.en_US
dc.relation.ispartofseriesMIT-LCS-TR-104
dc.relation.ispartofseriesMAC-TR-104
dc.titleCooperation of Mutually Suspicious Subsystems in a Computer Utilityen_US
dc.identifier.oclc03468214


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record