[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

A hardware implementation of capability-based addressing

Published: 01 October 1980 Publication History

Abstract

The SWARD architecture, an experimental higher-level architecture, contains the naming and protection concept of capability-based addressing. After discussing the merits of capability-based addressing, its general representation in the SWARD architecture is discussed. The initial representation of capability-based addressing in the architecture led to a set of problems; these problems are described, as well as their solutions. Finally, the implementation of capabilities by the processor is discussed.

References

[1]
J. B. Dennis and E. C. Van Horn, "Programming Semantics for Multiprogrammed Computation," CACM, 9(3), 143--155 (1966).
[2]
P. J. Denning, "Fault-Tolerant Operating Systems," Computing Surveys, 8(4), 359--390 (1976).
[3]
T. A. Linden, "Operating System Structures to Support Security and Reliable Software," Computing Surveys, 8(4), 409--445 (1976).
[4]
B. W. Lampson, "Dynamic Protection Structures," Proc. 1969 FJCC. Montvale, N. J.: AFIPS Press, 1969, pp. 27--38.
[5]
B. W. Lampson, "Protection," Proc. Fifth Princeton Symp. on Information Sciences and Systems. Princeton, N.J.: Princeton University, 1971, pp. 437--443, reprinted in Operating System Review, 8(1), 18--24 (1974).
[6]
B. W. Lampson and H. E. Sturgis, "Reflections on an Operating System Design," CACM, 19(5), 251--265 (1976).
[7]
E. Cohen and D. Jefferson, "Protection in the Hydra Operating System," Proc. Fifth Symp. on Operating System Principles. New York: ACM, 1975, pp. 141--160.
[8]
D. M. England, "Architectural Features of System 250," Infotech State of the Art Report 14: Operating Systems. Berkshire, England: Infotech, 1972, pp. 395--428.
[9]
IBM System/38 Technical Developments. Atlanta: IBM, 1978.
[10]
R. M. Needham and R. D. H. Walker, "The Cambridge CAP Computer and its Protection System," Proc. Sixth Symp. on Operating System Principles. New York: ACM, 1977, pp. 1--10.
[11]
A. J. Herbert, "A New Protection Architecture for the Cambridge Capability Computer," Operating System Review, 12(1), 24--28 (1978).
[12]
G. J. Myers, "Storage Concepts in a Software-Reliability-Directed Computer Architecture," Proc. Fifth Annual Symp. on Computer Architecture. New York: ACM, 1978, pp. 107--113.
[13]
G. J. Myers, Advances in Computer Architecture. New York: Wiley-lnterscience, 1978.
[14]
G. J. Myers, "SWARD - A Software-Oriented Architecture," Proc. International Workshop on High-Level Language Computer Architecture. University of Maryland, 1980, pp. 163--168.
[15]
G. J. Battarel and R. J. Chevance, "Design of a High Level Language Machine," Computer Architecture News, 6(9), 5--17 (1978).
[16]
H. J. Saal and I. Gat, "A Hardware Architecture for Controlling Information Flow," Proc. Fifth Annual Symp. on Computer Architecture. New York: ACM, 1978, pp. 73--77.
[17]
R. S. Fabry, "Capability-Based Addressing," CACM, 17(7), 403--412 (1974).
[18]
M. J. Spier, T. N. Hastings, and D. N. Cutler, "An Experimental Implementation of the Kernal/Domain Architecture," Proc. Fourth Symp. on Operating System Principles. New York: ACM, 1973, pp. 8--21.

Cited By

View all
  • (2023)Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFIProceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 310.1145/3582016.3582023(266-281)Online publication date: 25-Mar-2023
  • (2015)Password systemsComputers and Electrical Engineering10.1016/j.compeleceng.2015.02.01247:C(318-326)Online publication date: 1-Oct-2015
  • (2001)An Analysis of Access Control ModelsInformation Security and Privacy10.1007/3-540-48970-3_23(281-293)Online publication date: 27-Jul-2001
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 14, Issue 4
October 1980
70 pages
ISSN:0163-5980
DOI:10.1145/850708
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 1980
Published in SIGOPS Volume 14, Issue 4

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)50
  • Downloads (Last 6 weeks)6
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFIProceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 310.1145/3582016.3582023(266-281)Online publication date: 25-Mar-2023
  • (2015)Password systemsComputers and Electrical Engineering10.1016/j.compeleceng.2015.02.01247:C(318-326)Online publication date: 1-Oct-2015
  • (2001)An Analysis of Access Control ModelsInformation Security and Privacy10.1007/3-540-48970-3_23(281-293)Online publication date: 27-Jul-2001
  • (1997)Customized Message PassingJournal of Parallel and Distributed Computing10.1006/jpdc.1996.129441:2(205-224)Online publication date: 15-Mar-1997
  • (1993)A survey of memory managementMicroprocessing and Microprogramming10.1016/0165-6074(93)90254-I36:3(141-162)Online publication date: 1-May-1993
  • (1992)Programming Persistence in "Computer10.1109/2.15638225:9(57-66)Online publication date: 1-Sep-1992
  • (1991)Architectural support for persistent object systemsProceedings 1991 International Workshop on Object Orientation in Operating Systems10.1109/IWOOOS.1991.183022(48-60)Online publication date: 1991
  • (1990)Protection in Persistent Object SystemsSecurity and Persistence10.1007/978-1-4471-3178-6_4(48-66)Online publication date: 1990
  • (1988)Single-user capabilities in interprocess communicationACM SIGOPS Operating Systems Review10.1145/43914.4391822:2(45-52)Online publication date: 1-Apr-1988
  • (1984)A proposal for an architectural approach which apparently solves all known software-based internal computer security problemsACM SIGOPS Operating Systems Review10.1145/850759.85076218:3(31-39)Online publication date: 1-Jul-1984
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media