[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Policy/mechanism separation in Hydra

Published: 01 November 1975 Publication History

Abstract

The extent to which resource allocation policies are entrusted to user-level software determines in large part the degree of flexibility present in an operating system. In Hydra the determination to separate mechanism and policy is established as a basic design principle and is implemented by the construction of a kernel composed (almost) entirely of mechanisms. This paper presents three such mechanisms (scheduling, paging, protection) and examines how external policies which manipulate them may be constructed. It is shown that the policy decisions which remain embedded in the kernel exist for the sole purpose of arbitrating conflicting requests for physical resources, and then only to the extent of guaranteeing fairness.

References

[1]
Belady, L A., "A Study of Replacement Algorithms for Virtual Storage Computers", IBM Systems Journal 5, 2 (1966).
[2]
Bernstein, A. and Sharp, J., "A Policy-Driven Scheduler for a Time-Sharing System", Communications of the ACM 14, 2 (Feb. 1971).
[3]
Cohen, E. and Jefferson, D., "Protection in the Hydra Operating System", Proceedings of the 5th Symposium on Operating System Principles, Austin, Texas, Nov. 1975.
[4]
Denning, P. J., "The Working Set Model for Program Behavior", Communications of the ACM 11, 5 (May 1968).
[5]
Denning, P. J., "Virtual Memory", Computing Surveys 2, 3 (Sept. 1970).
[6]
Jones, A. K., and Wulf, W. A., "Towards the Design of Secure Systems", International Workshop on Protection in Operating Systems, IRIA, 1974.
[7]
Lampson, B., "A Note on the Confinement Problem", Communications of the ACM 16, 10 (October 1973).
[8]
Parnas, D., "On the Criteria to be Used in Decomposing Systems into Modules", Communications of the ACM 15, 12 (December 1972).
[9]
Wulf, W., et al., "HYDRA: The Kernel of a Multiprocessor Operating System", Communications of the ACM 17, 6 (1974).
[10]
Wulf, W., Levin, R., Pierson, C., "An Overview of the HYDRA Operating System Development", Proceedings of the 5th Symposium on Operating System Principles, Austin, Texas, Nov. 1975.

Cited By

View all
  • (2024)ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control ModelACM Transactions on Privacy and Security10.1145/367114727:3(1-36)Online publication date: 17-Jun-2024
  • (2023)Image Modification Modeled as a Storytelling ProcessLinking Theory and Practice of Digital Libraries10.1007/978-3-031-43849-3_26(295-302)Online publication date: 22-Sep-2023
  • (2019)XPCProceedings of the 46th International Symposium on Computer Architecture10.1145/3307650.3322218(671-684)Online publication date: 22-Jun-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 9, Issue 5
November 1975
222 pages
ISSN:0163-5980
DOI:10.1145/1067629
Issue’s Table of Contents
  • cover image ACM Conferences
    SOSP '75: Proceedings of the fifth ACM symposium on Operating systems principles
    November 1975
    222 pages
    ISBN:9781450378635
    DOI:10.1145/800213
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 1975
Published in SIGOPS Volume 9, Issue 5

Check for updates

Author Tags

  1. Mechanism
  2. Operating system
  3. Paging
  4. Policy
  5. Protection
  6. Resource allocation
  7. Scheduling

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)293
  • Downloads (Last 6 weeks)46
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control ModelACM Transactions on Privacy and Security10.1145/367114727:3(1-36)Online publication date: 17-Jun-2024
  • (2023)Image Modification Modeled as a Storytelling ProcessLinking Theory and Practice of Digital Libraries10.1007/978-3-031-43849-3_26(295-302)Online publication date: 22-Sep-2023
  • (2019)XPCProceedings of the 46th International Symposium on Computer Architecture10.1145/3307650.3322218(671-684)Online publication date: 22-Jun-2019
  • (2019)Large-scale Experimentation with Network Abstraction for Network Configuration Management2019 22nd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)10.1109/ICIN.2019.8685922(60-65)Online publication date: Feb-2019
  • (2018)ArachneProceedings of the 13th USENIX conference on Operating Systems Design and Implementation10.5555/3291168.3291180(145-160)Online publication date: 8-Oct-2018
  • (2018)Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained SensorsSensors10.3390/s1802057518:2(575)Online publication date: 13-Feb-2018
  • (2018)5G networks must be autonomic!NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS.2018.8406185(1-5)Online publication date: 23-Apr-2018
  • (2018)Taming policy complexity: Model to executionNOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium10.1109/NOMS.2018.8406172(1-8)Online publication date: 23-Apr-2018
  • (2016)L4 MicrokernelsACM Transactions on Computer Systems10.1145/289317734:1(1-29)Online publication date: 6-Apr-2016
  • (2016)Sprint Ability: How Well Does Your Software Exploit Bursts in Processing Capacity?2016 IEEE International Conference on Autonomic Computing (ICAC)10.1109/ICAC.2016.61(173-178)Online publication date: Jul-2016
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media